RSA Authentication Manager 8.1 Setup and Configuration Guide

RSA® Authentication Manager 8.1
Setup and Configuration Guide
Revision 2
Contact Information
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm
Trademarks
RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or
other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA trademarks, go
to www.emc.com/legal/emc-corporation-trademarks.htm#rsa.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and
may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice
below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any
other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Third-Party Licenses
This product may include software developed by parties other than RSA. The text of the license agreements applicable to
third-party software in this product may be viewed on the product documentation page on RSA SecurCare Online. By using
this product, a user of this product agrees to be fully bound by terms of the license agreements.
Note on Encryption Technologies
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
Copyright © 1994-2014 EMC Corporation. All Rights Reserved. Published in the U.S.A.
December 2013
Revised: December 2014
H13786
RSA Authentication Manager 8.1 Setup and Configuration Guide
Contents
Revision History .............................................................................................................. 7
Preface................................................................................................................................... 9
About This Guide................................................................................................................ 9
RSA Authentication Manager 8.1 Documentation ............................................................. 9
Related Documentation..................................................................................................... 10
Support and Service .......................................................................................................... 10
Before You Call Customer Support............................................................................11
Chapter 1: Preparing for Deployment .............................................................. 13
Planning Decisions............................................................................................................ 13
Appliance Support............................................................................................................. 14
VMware Virtual Appliance Requirements ....................................................................... 15
VMware Software Requirements............................................................................... 15
VMware Software Support ........................................................................................ 15
VMware Primary or Replica Instance Hardware Requirements ............................... 16
VMware Feature Support........................................................................................... 16
Hyper-V Virtual Appliance Requirements ....................................................................... 18
Hyper-V Software Requirements............................................................................... 18
Hyper-V Primary or Replica Instance Hardware Requirements ............................... 19
Hyper-V Feature Support........................................................................................... 19
Supported Data Stores....................................................................................................... 20
Internal Database ....................................................................................................... 20
Supported Directory Servers...................................................................................... 20
Supported Web Browsers.................................................................................................. 21
Supported RSA Authentication Agents ............................................................................ 21
License Requirements ....................................................................................................... 22
Accurate System Date and Time Settings......................................................................... 22
Secure Appliance Deployment.......................................................................................... 23
Deployment Checklist for the Primary Instance ............................................................... 24
VMware Virtual Appliance Deployment................................................................... 24
Hyper-V Virtual Appliance Deployment................................................................... 24
Hardware Appliance Deployment ............................................................................. 25
Quick Setup Checklist ............................................................................................... 25
Deployment Checklist for a Replica Instance................................................................... 26
VMware Virtual Appliance Deployment................................................................... 26
Hyper-V Virtual Appliance Deployment................................................................... 27
Hardware Appliance Deployment ............................................................................. 27
Quick Setup Checklist ............................................................................................... 27
Setup and Configuration Information List ........................................................................ 28
Appliance Deployment .............................................................................................. 28
Primary Appliance Setup ........................................................................................... 29
Replica Appliance Setup............................................................................................ 29
Contents
3
RSA Authentication Manager 8.1 Setup and Configuration Guide
Load Balancer Configuration..................................................................................... 30
Web Tier Installation ................................................................................................. 30
Chapter 2: Deploying a Primary Appliance .................................................. 31
Perform Deployment Tasks .............................................................................................. 31
Deploy the Virtual Appliance Through VMware vCenter Server .................................... 31
Deploy the Virtual Appliance Directly to the VMware ESXi Server............................... 33
Deploy the Virtual Appliance Through the Hyper-V Virtual Machine Manager Console35
Deploy the Virtual Appliance Through the Hyper-V Manager ........................................ 38
Deploy the Hardware Appliance....................................................................................... 40
Run Quick Setup on the Primary Instance ........................................................................ 42
Certificate Management for Secure Sockets Layer........................................................... 44
Log On to the Consoles..................................................................................................... 45
Chapter 3: Deploying a Replica Appliance ................................................... 47
Perform Deployment Tasks .............................................................................................. 47
Generate and Download a Replica Package File .............................................................. 48
Run Quick Setup on the Replica Instance......................................................................... 48
Attach the Replica Instance to the Primary Instance ........................................................ 51
Replica Attachment Issues and Solutions .................................................................. 52
Chapter 4: Configuring a Virtual Host and Load Balancer ................. 55
Virtual Host and Load Balancer Overview....................................................................... 55
Load Balancer Requirements ............................................................................................ 55
Configure a Load Balancer and Virtual Host.................................................................... 55
Load Balance Using the Web Tier with Round Robin DNS ............................................ 57
Chapter 5: Installing Web Tiers ........................................................................... 59
Web Tier Overview........................................................................................................... 59
Self-Service, Dynamic Seed Provisioning, and RBA Traffic in a Web Tier............. 60
Web-Tier Hardware and Operating System Requirements............................................... 61
Performing Web Tier Pre-Installation Tasks .................................................................... 62
Installing the Web Tier ..................................................................................................... 63
Add a Web-Tier Deployment Record ............................................................................... 63
Web-Tier Installation Checklist ........................................................................................ 65
Install a Web Tier on Windows Using the Graphical User Interface ........................ 66
Install a Web Tier on Windows Using the Command Line....................................... 67
Install a Web Tier on Linux Using the Graphical User Interface .............................. 68
Install a Web Tier on Linux Using the Command Line ............................................ 70
Chapter 6: Next Steps for Your Deployment ............................................... 73
Appendix A: Applying RSA Authentication Manager 8.1 SP1 .......... 77
Before Installing SP1 ........................................................................................................ 77
Backup or VMware Snapshot Strongly Recommended ............................................ 77
Replicated Deployments ............................................................................................ 78
Additional Requirements ........................................................................................... 78
Installing SP1 .................................................................................................................... 79
4
Contents
RSA Authentication Manager 8.1 Setup and Configuration Guide
Specify a Product Update Location ........................................................................... 79
Scan for Updates ........................................................................................................ 80
Apply the Product Update.......................................................................................... 81
Update the Web Tier ......................................................................................................... 83
Appendix B: Upgrading RSA Authentication Manager 8.0 to 8.1 ... 85
Before Installing This Upgrade......................................................................................... 85
VMware Snapshot Strongly Recommended.............................................................. 85
Required Credentials.................................................................................................. 86
Replicated Deployments ............................................................................................ 86
Required Disk Space.................................................................................................. 86
Migrating From Version 7.1 ...................................................................................... 86
Patches for Version 8.0 and 8.1 ................................................................................. 87
Specify an Upgrade Patch Location.................................................................................. 87
Scan for Updates ............................................................................................................... 88
Apply the Upgrade Patch .................................................................................................. 89
After Installing this Upgrade on the Primary and Replica Instances ................................ 91
Reinstall the Web Tier ...................................................................................................... 91
Uninstall the Web Tier............................................................................................... 91
Generate a New Web-Tier Deployment Package ...................................................... 93
Run the Web-Tier Installer for Your Platform .......................................................... 93
Update the Web Tier.................................................................................................. 94
Appendix C: Port Usage ........................................................................................... 95
Port Traffic........................................................................................................................ 95
Ports for the RSA Authentication Manager Instance........................................................ 95
Restricting Access to the RSA Consoles ................................................................... 99
Required RSA RADIUS Server Listening Ports ....................................................... 99
Port Considerations for Trusted Legacy Realms ..................................................... 100
Ports on the Web Tier with a Load Balancer Deployed ................................................. 101
Ports on the Web Tier Without a Load Balancer ............................................................ 101
Access Through Firewalls............................................................................................... 102
Securing Connections Between the Primary and Replica Instances........................ 103
Appendix D: Administrative Accounts .......................................................... 105
System Administrator Accounts ..................................................................................... 105
Authentication Manager Administrator Accounts ................................................... 105
Appliance Operating System Account..................................................................... 106
Manage a Super Admin Account............................................................................. 107
Appendix E: Installing the RSA Authentication Manager Token
Management Snap-In .............................................................................................. 109
Overview ......................................................................................................................... 109
System Requirements...................................................................................................... 109
Install the Token Management Snap-In for Local Access .............................................. 109
Install the Token Management Snap-In for Remote Access............................................110
Contents
5
RSA Authentication Manager 8.1 Setup and Configuration Guide
Performing Post-Installation Tasks..................................................................................112
Start the Active Directory User and Computer Management Console.....................112
Configure the Connection with Authentication Manager.........................................112
Glossary ............................................................................................................................115
Index ................................................................................................................................... 125
6
Contents
RSA Authentication Manager 8.1 Setup and Configuration Guide
Revision History
Revision
Number
Date
Revision
1
February 2014
Added instructions for upgrading RSA Authentication
Manager 8.0 to 8.1.
Removed a reference to thin-provisioned storage on the
virtual appliance. Thick-provisioned storage is also
supported.
2
December 2014
Updated for RSA Authentication Manager 8.1 Service Pack 1
(SP1).
Added instructions for deploying a Hyper-V virtual appliance
that includes version 8.1 SP1.
Added instructions for applying version 8.1 SP1 to a
VMware virtual appliance or a hardware appliance.
Revision History
7
RSA Authentication Manager 8.1 Setup and Configuration Guide
Preface
About This Guide
This guide is intended for network and system administrators who are responsible for
installing and securing the various components of an RSA® Authentication Manager
deployment.
RSA Authentication Manager 8.1 Documentation
For information about RSA Authentication Manager 8.1, see the following
documentation. RSA recommends that you store the product documentation in a
location on your network that is accessible to administrators.
Release Notes. Describes what is new and changed in this release, as well as
workarounds for known issues.
Hardware Appliance Getting Started. Describes how to deploy a hardware appliance
and perform the Authentication Manager Quick Setup process.
Virtual Appliance Getting Started. Describes how to deploy a virtual appliance and
perform the Authentication Manager Quick Setup process.
Planning Guide. Describes the high-level architecture of Authentication Manager and
how it integrates with your network.
Setup and Configuration Guide. Describes how to set up and configure
Authentication Manager.
Administrator’s Guide. Provides an overview of Authentication Manager and its
features. Describes how to configure the system and perform a wide range of
administration tasks, including manage users and security policies.
Help Desk Administrator’s Guide. Provides instructions for the most common tasks
that a Help Desk Administrator performs on a day-to-day basis.
SNMP Reference Guide. Describes how to configure Simple Network Management
Protocol (SNMP) to monitor an instance of Authentication Manager on a hardware
appliance or a virtual appliance.
Troubleshooting Guide. Describes the most common error messages in RSA
Authentication Manager and provides the appropriate actions to troubleshoot each
event.
Developer’s Guide. Provides information about developing custom programs using
the RSA Authentication Manager application programming interfaces (APIs).
Includes an overview of the Authentication Manager APIs and the related Javadoc.
Performance and Scalability Guide. Describes what to consider when tuning your
deployment for optimal performance.
6.1 to 8.1 Migration Guide. Describes how to migrate from an RSA Authentication
Manager 6.1 deployment to an RSA Authentication Manager 8.1 deployment.
Preface
9
RSA Authentication Manager 8.1 Setup and Configuration Guide
7.1 to 8.1 Migration Guide: Migrating to a New Hardware Appliance or Virtual
Appliance. Describes how to migrate from an RSA Authentication Manager 7.1
deployment to an RSA Authentication Manager 8.1 deployment on a new hardware
appliance or virtual appliance.
7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 on Existing
Hardware. Describes how to migrate from an RSA Authentication Manager 7.1
deployment to an RSA Authentication Manager 8.1 deployment on existing,
supported RSA SecurID Appliance 3.0 hardware.
Security Console Help. Describes day-to-day administration tasks performed in the
Security Console.
Operations Console Help. Describes configuration and setup tasks performed in the
Operations Console.
Self-Service Console Help. Describes how to use the Self-Service Console. To view
the Help, on the Help tab in the Self-Service Console, click Self-Service Console
Help.
RSA Token Management Snap-In Help. Describes how to use software that works
with the Microsoft Management Console (MMC) for deployments that have an Active
Directory identity source. Using this snap-in, you can enable or disable a token, assign
a token, or perform other token-related tasks without logging on to the Security
Console.
Related Documentation
RADIUS Reference Guide. Describes the usage and settings for the initialization
files, dictionary files, and configuration files used by RSA RADIUS.
Security Configuration Guide. Describes the security configuration settings available
in RSA Authentication Manager. It also describes secure deployment and usage
settings, secure maintenance, and physical security controls.
Support and Service
RSA SecurCare Online
https://knowledge.rsasecurity.com
Customer Support Information
www.emc.com/support/rsa/index.htm
RSA Solution Gallery
https://gallery.emc.com/community/ma
rketplace/rsa?view=overview
RSA SecurCare Online offers a knowledgebase that contains answers to common
questions and solutions to known problems. It also offers information on new releases,
important technical news, and software downloads.
10
Preface
RSA Authentication Manager 8.1 Setup and Configuration Guide
The RSA Solution Gallery provides information about third-party hardware and
software products that have been certified to work with RSA products. The gallery
includes Secured by RSA Implementation Guides with step-by-step instructions and
other information about interoperation of RSA products with these third-party
products.
Before You Call Customer Support
Please have the following information available when you call:
 Access to the RSA Authentication Manager appliance.
 Your license serial number. To locate the license serial number, do one of the
following:
•
Look at the order confirmation e-mail that you received when your ordered
the product. This e-mail contains the license serial number.
•
Log on to the Security Console, and click License Status. Click View
Installed License.
 The Authentication Manager appliance software version information. You can
find this information in the top, right corner of the Quick Setup, or in the
Security Console. Log on to the Security Console, and click Software Version
Information.
Preface
11
RSA Authentication Manager 8.1 Setup and Configuration Guide
1
Preparing for Deployment
Planning Decisions
Before you set up your RSA Authentication Manager 8.1 deployment, you must
decide which Authentication Manager components you want to install. A deployment
can include the following components:
Primary Instance. The instance on which all administration takes place. It can
also service authentication requests.
Replica Instance. Provides redundancy of the primary instance and authenticates
users. RSA recommends a deployment containing both a primary instance and a
replica instance. The RSA Authentication Manager Base Server license and the
Enterprise Server license both include permission to deploy a replica instance.
Web Tiers. Allows the secure deployment of the RSA Self-Service Console,
dynamic seed provisioning, and the risk-based authentication (RBA) service
within the demilitarized zone (DMZ).
Load Balancer. Used to distribute authentication requests and to facilitate
failover between the primary and replica web tiers.
Authentication Agents. Installed on any resource that you want to protect.
For more information on deployment planning topics, see the Planning Guide.
1: Preparing for Deployment
13
RSA Authentication Manager 8.1 Setup and Configuration Guide
Appliance Support
RSA Authentication Manager 8.1 supports a VMware virtual appliance, a Hyper-V
virtual appliance, and a hardware appliance. Each type of appliance provides the same
Authentication Manager features. You can use one type of appliance or both virtual
and hardware appliances in your deployment.
Both a virtual appliance and a hardware appliance include a Linux operating system
that is installed with Authentication Manager and RSA RADIUS server software. To
configure an appliance as an Authentication Manager instance, you must complete
Quick Setup.
The following differences apply:
•
•
•
14
VMware virtual appliance:
–
The VMware virtual appliance is deployed with VMware vCenter Server or
the VMware ESXi Server (VMware Hypervisor) on a host machine that you
provide. You must use a host machine that meets the hardware requirements.
–
The VMware virtual appliance supports VMware features, such as VMware
snapshots.
Hyper-V virtual appliance:
–
The Hyper-V virtual appliance is deployed with the Hyper-V System Center
Virtual Machine Manager (VMM) Console or the Hyper-V Manager on a host
machine that you provide. You must use a host machine that meets the
hardware requirements.
–
The Hyper-V virtual appliance supports Hyper-V features, such as Hyper-V
checkpoints.
Hardware appliance:
–
Before performing Quick Setup, the RSA-supplied hardware appliance is
deployed by directly accessing the hardware, and connecting a keyboard and
monitor to the machine to configure the network and keyboard language
settings.
–
You can only perform a factory reset on the hardware appliance.
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
VMware Virtual Appliance Requirements
If you deploy RSA Authentication Manager 8.1 on a VMware virtual appliance, use
the VMware vSphere Client to deploy a virtual appliance through VMware vCenter
Server or directly on the VMware ESXi platform (also known as VMware vSphere
Hypervisor 4.1 or later). VMware vCenter Server is not required to deploy the virtual
appliance.
Deploy a VMware virtual appliance with the RSA Authentication Manager Open
Virtualization Appliance (OVA) file that is located in the RSA Authentication
Manager 8.1 download kit.
VMware Software Requirements
Required Software
Description
VMware Platforms
Deploy the virtual appliance on one of the following
platforms:
• VMware ESXi 4.1 or later (VMware vSphere Hypervisor
4.1 or later)
• VMware ESXi 5.0 or later (VMware vSphere Hypervisor
5.0 or later)
VMware vSphere Client
Any version of the vSphere Client that works with supported
ESXi (Hypervisor) and vCenter Server deployments.
For the VMware host hardware requirements, see your VMware documentation.
VMware Software Support
Supported Software
Description
(Optional) VMware vCenter
Server
VMware vCenter Server provides centralized management
for multiple virtual machines and includes administrative
features, such as vMotion.
The virtual appliance supports the versions of VMware
vCenter Server that are compatible with the supported ESX
and ESXi versions:
• VMware vCenter Server 4.1 or later
• VMware vCenter Server 5.0 or later
1: Preparing for Deployment
15
RSA Authentication Manager 8.1 Setup and Configuration Guide
VMware Primary or Replica Instance Hardware Requirements
The virtual appliance for each RSA Authentication Manager instance requires
hardware that meets or exceeds the minimum requirements. Each instance is deployed
with the default values.
Description
Minimum Requirement
Default Value
Disk Space
100 GB storage
100 GB storage
4 GB swap file
4 GB swap file
Memory Requirements
4 GB
8 GB
CPU Requirements
One virtual CPU
Two virtual CPUs
Automatic tuning on the virtual appliance supports 4 GB, 8 GB, or 16 GB of memory.
For example, the appliance uses 16 GB of memory if more than 16 GB is available.
The virtual appliance only supports the E1000 virtual network adapter. Do not change
the default network adapter or add a new virtual network adapter to the virtual
appliance.
For the VMware host hardware requirements, consult your VMware documentation.
For information on ports used by Authentication Manager, see Port Usage on page 95.
VMware Feature Support
RSA Authentication Manager supports VMware features, such as vMotion, Storage
vMotion, High Availability, Fault Tolerance, Distributed Resource Scheduler (DRS),
and Snapshots. Restrictions are described in the following table.
Feature
Support
VMware Fault Tolerance
VMware Fault Tolerance in VMware vSphere 4.1 and 5.0 has
the following requirements:
• Only virtual appliances with a single virtual CPU are
compatible with Fault Tolerance. By default, each
Authentication Manager instance is deployed with two
virtual CPUs.
You can change the number of virtual CPUs. For
instructions, see the VMware vSphere Client
documentation.
• VMware Fault Tolerance does not support IPv6. If you use
Fault Tolerance, do not create an IPv6 network address on
an Authentication Manager primary or replica instance
16
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
Feature
Support
VMware snapshots
You can take a VMware snapshot of an Authentication
Manager primary or replica instance, but snapshots do not
replace the Operations Console backup feature.
When you take a snapshot of an Authentication Manager
instance, specific settings are required. In a complex
Authentication Manager deployment, restoring snapshots
requires you to perform additional tasks.
For information, see the chapter “Disaster Recovery” in the
Administrator’s Guide.
VMware Distributed
Resource Scheduler (DRS)
For security and redundancy, you can install primary and
replica instances on separate hosts.
VMware DRS can move both instances onto the same host.
Configure DRS to keep instances on separate physical hosts.
1: Preparing for Deployment
17
RSA Authentication Manager 8.1 Setup and Configuration Guide
Hyper-V Virtual Appliance Requirements
If you deploy RSA Authentication Manager 8.1 on a Hyper-V virtual appliance, use
the Microsoft Hyper-V System Center Virtual Machine Manager (VMM) Console or
the Hyper-V Manager.
Deploy a Hyper-V virtual appliance with the RSA Authentication Manager Hyper-V
virtual appliance zip file that is available from RSA Download Central at
https://download.rsasecurity.com.
Hyper-V Software Requirements
Required Software
Description
Windows Server
Microsoft Windows 2012 R2 host machine
Hyper-V Management
Tools
Deploy the Hyper-V virtual appliance with one of the following
tools:
• Hyper-V System Center 2012 R2 Virtual Machine Manager
(VMM).
• Hyper-V Manager 2012 R2.
PowerShell
Windows PowerShell 4.0 or later:
• If you are using VMM, use the Windows PowerShell version
that is included with the VMM Console installation.
• If you are using Hyper-V Manager, use the Windows PowerShell
version that is included with Windows 2012 R2.
Hyper-V Virtual
Machine Manager
(VMM) Modules
If you are using VMM, then install the VMM Console to obtain the
required Virtual Machine Manager Windows PowerShell module.
To verify that the required Hyper-V and VirtualMachineManager
PowerShell modules are available, run these two PowerShell
commands:
Get-Command -Module Hyper-V
Get-Command -Module VirtualMachineManager
The output displays a list of commands related to each module.
For more information, see your Hyper-V documentation.
Hyper-V Manager
Software
If you are using Hyper-V Manager, then install both the Hyper-V
role and the management tools. For example, if you use Server
Manager to install the Hyper-V role, the management tools are
included by default.
For instructions, see your Hyper-V documentation.
For the Hyper-V host hardware requirements, see your Hyper-V documentation.
18
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
Hyper-V Primary or Replica Instance Hardware Requirements
The virtual appliance for each RSA Authentication Manager instance requires
hardware that meets or exceeds the minimum requirements.
Description
Minimum Requirement
Default Value
Disk Space
100 GB storage
100 GB storage
4 GB swap file
4 GB swap file
Memory Requirements
4 GB
8 GB
CPU Requirements
One virtual CPU
Two virtual CPUs
Automatic tuning on the virtual appliance supports 4 GB, 8 GB, or 16 GB of memory.
For example, the appliance uses 16 GB of memory if more than 16 GB is available.
The Hyper-V virtual appliance provides a virtual network adapter that uses the
hv_netvsc driver. Do not use the legacy network adapter. The legacy network adapter
is not supported.
For the Hyper-V host hardware requirements, consult your Hyper-V documentation.
For information on ports used by Authentication Manager, see Port Usage on page 95.
Hyper-V Feature Support
RSA Authentication Manager supports Hyper-V features, such as live migration, high
availability through failover clustering, NIC teaming for virtual machines, and
checkpoints. Restrictions are described in the following table.
Feature
Support
Dynamic memory
Dynamic memory is not supported for the Hyper-V virtual
appliance. Static memory is supported. For more information
on memory requirements, see Hyper-V Primary or Replica
Instance Hardware Requirements on page 19.
Hyper-V checkpoints
You can create a Hyper-V checkpoint for an Authentication
Manager primary or replica instance, but checkpoints do not
replace the Operations Console backup feature.
In a complex Authentication Manager deployment, restoring
a virtual machine to a checkpoint requires you to perform
additional tasks.
For information, see the chapter “Disaster Recovery” in the
Administrator’s Guide.
Hyper-V high availability
For security and redundancy, you can install primary and
replica instances on separate hosts.
Hyper-V live migration can move both instances onto the
same host. Configure high availability to use availability sets
to keep instances on separate physical hosts.
1: Preparing for Deployment
19
RSA Authentication Manager 8.1 Setup and Configuration Guide
Supported Data Stores
You can store data in:
•
The RSA Authentication Manager internal database
•
One or more external directory servers that use LDAP (called an identity source
within Authentication Manager).
Internal Database
Authentication Manager is installed with an internal database. The following
information is stored only in the internal database:
•
Data that is specific to Authentication Manager, such as token data or policies for
administrative roles and passwords.
•
Data that links Authentication Managerwith LDAP directory user and user group
records.
Users, user groups, and identity attribute data can be stored in an external LDAP
directory or in the internal database.
Supported Directory Servers
RSA Authentication Managersupports the following external LDAP directory servers
for user, user group, and identity attribute data:
•
Microsoft Active Directory 2008 R2
•
Microsoft Active Directory 2012
•
Microsoft Active Directory 2012 R2
•
Sun Java System Directory Server 7.0
•
Oracle Directory Server Enterprise Edition 11g
Active Directory Application Mode (ADAM) is not supported.
Authentication Manager has read-only access to all external directory servers.
However, you can configure the system to allow users to change their passwords in
LDAP during authentication.
Authentication Manager LDAP integration does not modify your existing LDAP
schema, but rather creates a map to your data that Authentication Manager uses.
Authentication Manager supports Secure Socket Layer (SSL) for LDAP connections.
SSL is required if you are allowing users to change their passwords from
Authentication Manager. Non-SSL connections can expose sensitive data as it passes
over the connection. For example, if bind LDAP operations to authenticate are
performed over a non-SSL connection, the password is sent in the clear. The use of
LDAP over SSL requires that the appropriate certificate is accessible by
Authentication Manager.
For more information, see the chapter “Integrating LDAP Directories” in the
Administrator’s Guide.
20
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
Supported Web Browsers
RSA Authentication Manager administration is managed through a web-based
interface and must be accessed through a supported browser. Authentication Manager
supports the following web browsers:
•
Microsoft Internet Explorer 7.0 or later
•
Mozilla Firefox 10.0 or later.
•
Google Chrome 18 or later
•
Apple Safari 5.1 or later
The web browser must allow JavaScript and cookies. If your web browser does not
have JavaScript and cookies enabled, see your web browser documentation for
instructions on enabling JavaScript and cookies.
Note: To correctly display the web-based interface, you must have a screen resolution
of 1024 X 768 or higher.
Supported RSA Authentication Agents
Authentication agents are software applications that securely pass user authentication
requests to and receives responses from RSA Authentication Manager. Authentication
agents are installed on each machine, such as a domain server, web server, or a
personal computer, that you protect with Authentication Manager. Any resource that is
used with SecurID authentication, on-demand authentication (ODA) or risk-based
authentication (RBA) requires an authentication agent.
The agent that you need depends on the type of resource you want to protect. For
example, to protect an Apache web server, you need to download the RSA
Authentication Agent for Apache. You may purchase products that contain embedded
RSA Authentication Agent software. For example, these products include all the
major brands of remote access servers and firewalls.
For a list of RSA authentication agents, go to
http://www.emc.com/security/rsa-securid/rsa-securid-authentication-agents.htm
#!offerings.
For a list of third-party products that have embedded RSA agents, go to the
RSA Secured® web site at
https://gallery.emc.com/community/marketplace/rsa?view=overview.
For more information, see the chapter “Deploying Authentication Agents” in the
Administrator’s Guide.
1: Preparing for Deployment
21
RSA Authentication Manager 8.1 Setup and Configuration Guide
License Requirements
RSA Authentication Manager has one or more associated licenses. The license
represents permission to use a specific version of the Authentication Manager
software. RSA Authentication Manager 8.1 supports the use of an existing version 8.0
license, a new version 8.1 license, or a combination of version 8.0 and 8.1 licenses.
You can purchase and install one of the following license types:
•
Base Server. A permanent license allowing 1 primary instance and 1 replica
instance of Authentication Manager.
•
Enterprise Server. A permanent license allowing 1 primary instance and up to 15
replica instances of Authentication Manager. The Enterprise Server license also
includes the Authenticator Provisioning feature.
Each license type limits the number of instances of Authentication Manager that can
be installed. User limits are based on the customer’s usage requirements. For more
information, see “Licenses” in the Administrator’s Guide.
RSA provides the license files separately from your RSA Authentication Manager 8.1
download kit. Make sure that you know the location of the license file before running
the primary appliance Quick Setup. The license file must be accessible to the browser
that is used to run the primary appliance Quick Setup. Do not unzip the license file.
Accurate System Date and Time Settings
RSA Authentication Manager requires accurate date and time settings for replication
and authentication. If the token clock and the Authentication Manager system clock
do not match, the generated tokencodes will not match, and authentication attempts
can fail. Specifying a Network Time Protocol (NTP) server for the instance prevents
replication and authentication issues that are caused by clock drift.
Important: An NTP server is required in a replicated deployment. RSA requires that
all Authentication Manager instances have their time synchronized to an NTP server.
If you do not specify an NTP server in Authentication Manager, the virtual appliance
uses the date and time provided by the physical machine hosting the virtual appliance.
In this situation, the physical machine hosting the virtual appliance should be
configured to obtain accurate date and time information from an NTP server.
Make sure that you have the hostname or IP address of an NTP server before running
Quick Setup.
22
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
Secure Appliance Deployment
After you deploy RSA Authentication Manager 8.1 on a hardware appliance or a
virtual appliance, the operating system console screen displays a Quick Setup Access
Code along with a Quick Setup URL. The Quick Setup Access Code is only available
until Quick Setup is complete.
The Quick Setup Access Code is required to begin Quick Setup, which configures the
appliance as an RSA Authentication Manager instance. This code makes it harder for
a malicious user to access Quick Setup and take control of the appliance.
Important: You must have the Quick Setup Access Code to begin Quick Setup.
On a hardware appliance only, a factory reset puts the appliance into a pre-configured
state. Any time you perform a factory reset on a hardware appliance, a new Quick
Setup Access Code is displayed in the operating system console or the Factory Reset
in Progress window in the Operations Console. The new code is required to run Quick
Setup. The factory reset feature is not available for a virtual appliance.
RSA recommends the following guidelines when deploying an appliance:
•
Deploy a hardware appliance in a test environment or in an isolated network. Only
connect the appliance to your organization’s network after Quick Setup is
complete. Restrict physical and network access to the appliance to authorized
individuals.
For example, you can deploy a hardware appliance and run Quick Setup in a
protected test environment that duplicates your production environment. After
Quick Setup is complete, you can move the appliance into the production
environment without changing the network settings, such as the hostname and the
IP Address.
Alternately, you can deploy the hardware appliance and run Quick Setup in a
protected test environment and later change the network settings, such as the
hostname and IP address, to attach the appliance to your production environment.
For instructions, see the appendix “Changing the Instance Network Settings” in
the Administrator’s Guide.
•
Deploy a virtual appliance on an isolated network until Quick Setup is complete.
Use VMware or Hyper-V to maintain full control over the appliance. Restrict
network access to the appliance, and only allow authorized individuals to access
the virtual appliance.
•
If you access an appliance to run Quick Setup, and you discover that the appliance
has already been configured or you receive error messages because Quick Setup is
in progress, then do the following:
a. Contact other administrators in your organization to ensure that a malicious
user is not trying to take control of the appliance.
b. If you believe that the appliance has been compromised, remove the primary
or replica instance from your deployment. For instructions, see the chapter
“System Maintenance and Disaster Recovery” in the Administrator’s Guide.
1: Preparing for Deployment
23
RSA Authentication Manager 8.1 Setup and Configuration Guide
c. Do one of the following:
•
For a hardware appliance, shut down the appliance and remove the
machine from service.
•
For a virtual appliance, suspend the appliance, and quarantine the
machine for further investigation.
d. Contact your IT department or RSA immediately.
Deployment Checklist for the Primary Instance
Before you set up the RSA Authentication Manager primary instance, you must
collect the following information. You enter this information during the appliance
deployment and Quick Setup.
VMware Virtual Appliance Deployment
If you are deploying RSA Authentication Manager on a virtual appliance, you must
collect the following items and information:
 VMware vSphere Client computer. You will use this computer to deploy the
appliance through the VMware vSphere Client. Use this computer to run Quick
Setup through a supported web browser. For a list of supported web browsers, see
Supported Web Browsers on page 21.
 RSA Authentication Manager Open Virtualization Appliance (OVA) file. The
RSA Authentication Manager OVA file is used to create your virtual appliance.
Copy the OVA file to a location accessible to VMware.
 IPv4 Network settings. Identify the fully qualified domain name and static IP
address for the appliance, the subnet mask and default gateway, and the IP address
or hostname of the DNS servers in the network.
You must provide this network information when deploying the appliance. The IP
address that you specify for the appliance is used to access Quick Setup.
Hyper-V Virtual Appliance Deployment
If you are deploying RSA Authentication Manager on a virtual appliance, you must
collect the following items and information:
 Microsoft Windows client computer with access to a Microsoft Windows 2012
R2 Hyper-V host machine. Use Remote Desktop Protocol or direct access to log
on to the Microsoft Windows 2012 R2 Hyper-V host machine. You can deploy the
appliance through either the Hyper-V Manager or the Hyper-V Virtual Machine
Manager (VMM) Console.
You will also use the Microsoft Windows client computer to run Quick Setup
through a supported web browser. For a list of supported web browsers, see
Supported Web Browsers on page 21.
24
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
 RSA Authentication Manager virtual appliance zip file. The RSA
Authentication Manager Hyper-V virtual appliance zip file is used to deploy your
virtual appliance. Copy the zip file to a location accessible to Hyper-V, such as a
Hyper-V VMM library server or a location on the Microsoft Windows 2012 R2
Hyper-V host machine that can be added as a library server.
 IPv4 Network settings. Identify the fully qualified domain name and static IP
address for the appliance, the subnet mask and default gateway, and the IP address
or hostname of the DNS servers in the network.
You must provide this network information when deploying the appliance. The IP
address that you specify for the appliance is used to access Quick Setup.
Hardware Appliance Deployment
If you are deploying RSA Authentication Manager on a hardware appliance, you must
collect the following items and information:
 Keyboard and Monitor. To deploy the hardware appliance and complete the
initial configuration tasks that are required for the deployment process, you must
attach a keyboard and monitor to the appliance.
 IPv4 Network settings. Identify the fully qualified domain name and static IP
address for the appliance, the subnet mask and default gateway, and the IP address
or hostname of the DNS servers in the network.
You must provide this network information when deploying the appliance. The IP
address that you specify for the appliance is used to access Quick Setup.
Quick Setup Checklist
You must enter the following information during the Quick Setup process for a
primary instance.
 Appliance license file. During Quick Setup, you must have access to the .zip
license file. You download the license file (.zip) from RSA Download Central at
https://download.rsasecurity.com.
Use the credentials and the license serial number that were e-mailed to you to log
on to the site and download the license file. If you did not receive this e-mail,
contact the License Seed Response Team. Send an e-mail with your contact
information and the license serial number provided in your order confirmation to
the following address appropriate for your region:
• Americas: license_seed_response@rsa.com
• EMEA: support@rsa.com.
• Asia Pacific: support@rsa.com
Make sure that you know the location of the license file before running the
primary appliance Quick Setup. The license file must be in a location that is
accessible to the browser that is used to run the primary appliance Quick Setup.
Do not unzip the file. RSA recommends that you store the license file in a
protected location available only to authorized administrative personnel.
1: Preparing for Deployment
25
RSA Authentication Manager 8.1 Setup and Configuration Guide
 Hostname or IP address of an NTP server. RSA recommends that you specify a
local or Internet Network Time Protocol (NTP) server, for example, nist.time.gov.
During Quick Setup, you can enter the hostname or IP address of at least one NTP
servers.
Important: An NTP server is required in a replicated deployment. RSA requires
that all Authentication Manager instances have their time synchronized to an NTP
server.
 Operating system password. Choose a password to access the appliance
operating system for troubleshooting and advanced administration. The password
must be between 8 and 32 characters long, and contain at least 1 alphabetic
character and at least 1 special character excluding ^, @, and ~. For example,
gyz!8kMh is a valid password. For more information, see System Administrator
Accounts on page 105.
 User ID and password for initial administrator accounts. Choose a User ID
and password to create the following:
–
Initial Security Console administrator User ID and password for the Super
Admin role
–
Operations Console administrator User ID and password
For information on managing administrator accounts and passwords, see System
Administrator Accounts on page 105.
Deployment Checklist for a Replica Instance
Before you set up an RSA Authentication Manager replica instance, you must collect
the following information about each replica that you want to set up. You enter this
information during the appliance deployment and Quick Setup.
VMware Virtual Appliance Deployment
If you are deploying RSA Authentication Manager on a virtual appliance, you must
collect the following items and information:
 VMware vSphere Client computer. You will use this computer to deploy the
appliance through the VMware vSphere Client. Use this computer to run Quick
Setup through a supported web browser. For a list of supported web browsers, see
Supported Web Browsers on page 21.
 RSA Authentication Manager Open Virtualization Appliance (OVA) file. The
RSA Authentication Manager OVA file is used to create your virtual appliance.
Copy the OVA file to a location accessible to VMware.
 IPv4 Network settings. Identify the fully qualified domain name and static IP
address for the appliance, the subnet mask and default gateway, and the IP address
or hostname of the DNS servers in the network.
You must provide this network information when deploying the appliance. The IP
address that you specify for the appliance is used to access Quick Setup.
26
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
Hyper-V Virtual Appliance Deployment
If you are deploying RSA Authentication Manager on a virtual appliance, you must
collect the following items and information:
 Microsoft Windows client computer with access to a Microsoft Windows 2012
R2 Hyper-V host machine. Use Remote Desktop Protocol or direct access to log
on to the Microsoft Windows 2012 R2 Hyper-V host machine. You can deploy the
appliance through either the Hyper-V Manager or the Hyper-V Virtual Machine
Manager (VMM) Console.
You will also use the Microsoft Windows client computer to run Quick Setup
through a supported web browser. For a list of supported web browsers, see
Supported Web Browsers on page 21.
 RSA Authentication Manager virtual appliance zip file. The RSA
Authentication Manager Hyper-V virtual appliance zip file is used to deploy your
virtual appliance. Copy the zip file to a location accessible to Hyper-V, such as a
Hyper-V VMM library server or a location on the Microsoft Windows 2012 R2
Hyper-V host machine that can be added as a library server.
 IPv4 Network settings. Identify the fully qualified domain name and static IP
address for the appliance, the subnet mask and default gateway, and the IP address
or hostname of the DNS servers in the network.
You must provide this network information when deploying the appliance. The IP
address that you specify for the appliance is used to access Quick Setup.
Hardware Appliance Deployment
If you are deploying RSA Authentication Manager on a hardware appliance, you must
collect the following items and information:
 Keyboard and Monitor. To deploy the hardware appliance and complete the
initial configuration tasks that are required for the deployment process, you must
attach a keyboard and monitor to the appliance.
 IPv4 Network settings. Identify the fully qualified domain name and static IP
address for the appliance, the subnet mask and default gateway, and the IP address
or hostname of the DNS servers in the network.
You must provide this network information when deploying the appliance. The IP
address that you specify for the appliance is used to access Quick Setup.
Quick Setup Checklist
You must enter the following information during the Quick Setup process for a replica
instance.
 Replica package file location. To set up a replica appliance, you must have
access to the replica package file. If necessary, copy the replica package file onto
the computer that you will use to run Quick Setup.
For more information on creating a replica package, see Generate and Download a
Replica Package File on page 48.
1: Preparing for Deployment
27
RSA Authentication Manager 8.1 Setup and Configuration Guide
 Hostname or IP address of an NTP server. You must synchronize the time on
the primary and replica appliances using a local or Internet Network Time
Protocol (NTP) server. During Quick Setup, you can enter hostname or IP address
of at least one NTP server.
 Operating system password. Choose a password to access the appliance
operating system for troubleshooting and advanced administration. The password
must be between 8 and 32 characters long, and contain at least 1 alphabetic
character and at least 1 special character excluding ^, @, and ~. For example,
gyz!8kMh is a valid password. Choose a unique password for each appliance. For
more information, see System Administrator Accounts on page 105.
Setup and Configuration Information List
Use the following list to specify setup and configuration information for RSA
Authentication Manager. RSA recommends that you complete this list and distribute it
to the appropriate personnel for your deployment. Save a copy of the completed list in
a secure location for future reference.
Note: Some of the information that you enter in this list may be sensitive. Review
your company’s policies before entering sensitive information, such as a password, in
this list.
Appliance Deployment
Element
Your Plan
RSA Authentication Manager
VMware OVA package location
or Hyper-V virtual appliance
zip file
(Virtual Appliance Only)
Fully qualified domain name
IPv4 Static IP address
IPv4 Subnet mask
IPv4 Default Gateway
IP address of the DNS servers
Note: If your deployment uses IPv6-compliant agents, you can add IPv6 network
settings in the Operations Console after Quick Setup is complete.
28
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
Primary Appliance Setup
Description
Your Plan
RSA Authentication Manager
license file (.zip) location
Hostname or IP address of an
NTP server
Operating System password
Super Admin user name
Super Admin password
Operations Console
Administrator user name
Operations Console
Administrator password
Replica Appliance Setup
Description
Your Plan
Replica package file location
Hostname or IP address of an
NTP server
Operating system password
1: Preparing for Deployment
29
RSA Authentication Manager 8.1 Setup and Configuration Guide
Load Balancer Configuration
Description
Your Plan
Load balancer IP address
Load balancer hostname/virtual
hostname
Port number
IP address of virtual host or
load balancer on the DNS
server
Web Tier Installation
Description
Your Plan
Location of the RSA
Authentication Manager 8.1
Extras download kit, which
contains the web-tier installers.
Web-tier server IP addresses
Web-tier server hostnames
IP address of the DNS server
30
1: Preparing for Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
2
Deploying a Primary Appliance
Perform Deployment Tasks
Perform these steps to deploy an appliance and configure an RSA Authentication
Manager primary instance.
Procedure
1. Deploy the appliance. Depending on your deployment, do one of the following:
•
For a VMware virtual appliance, you can either Deploy the Virtual Appliance
Through VMware vCenter Server or Deploy the Virtual Appliance Directly to
the VMware ESXi Server.
•
For a Hyper-V virtual appliance, you can either Deploy the Virtual Appliance
Through the Hyper-V Virtual Machine Manager Console or Deploy the
Virtual Appliance Through the Hyper-V Manager.
•
For a hardware appliance, see Deploy the Hardware Appliance.
2. Configure the appliance with Quick Setup, a software wizard that creates access
permission and specifies whether the appliance is a primary instance or a replica
instance. See Run Quick Setup on the Primary Instance.
3. Accept the internal RSA certificate authority (CA) certificate. See Certificate
Management for Secure Sockets Layer.
4. Log On to the Consoles.
Deploy the Virtual Appliance Through VMware vCenter Server
You can deploy a virtual appliance through VMware vCenter Server, if you are using
this administrative tool to manage the virtual appliances. This process requires several
minutes to complete.
Note: Depending on your VMware vCenter configuration and the version of the
VMware vSphere Client, some of the windows that are described in the following
procedure may not display. The window names may also vary.
Before You Begin
•
Collect the required information about each appliance instance being deployed.
See Secure Appliance Deployment on page 23.
•
Copy the RSA Authentication Manager Open Virtual Appliance (OVA) file to a
location that the VMware vSphere Client can access.
2: Deploying a Primary Appliance
31
RSA Authentication Manager 8.1 Setup and Configuration Guide
Procedure
1. In the VMware vSphere Client, log on to VMware vCenter Server.
2. Select File > Deploy OVF Template to start the deployment wizard.
3. On the Source window, under Deploy from a file or URL, click Browse, and
locate the RSA Authentication Manager OVA file to deploy. Click Next.
4. On the OVF Template Details window, verify that “RSA Authentication
Manager” and the expected version number displays. Click Next.
5. On the End User License Agreement window, scroll to read the agreement. Click
Accept, and Next.
6. On the Name and Location window, enter a Name for the virtual appliance, and
click Next.
7. On the Host/Cluster window, select a host or cluster for the virtual appliance.
Click Next.
8. On the Resource Pool window, select a resource pool. Resource pools let you
manage your resources within a host or cluster. Click Next.
9. On the Storage window, select an existing VMware datastore for the virtual
machine files. A VMware datastore can be a location such as a Virtual Machine
File System (VMFS) volume, a directory on Network Attached Storage, or a local
file system path. Click Next.
10. On the Disk Format window, select a format for storing virtual disks.
11. On the Network Mapping window, select the networks for the virtual appliance.
Click Next.
12. On the Properties window, enter the following IPv4 network settings for the
virtual appliance, and click Next:
•
Fully Qualified Domain Name
•
IP Address.
•
Subnet Mask
•
Default Gateway
•
(Optional) Primary DNS Server
•
(Optional) Secondary DNS Server
Note: If your deployment uses IPv6-compliant agents, you can add IPv6 network
settings in the Operations Console after Quick Setup is complete.
13. On the Ready to Complete window, review your settings, and click Finish.
VMware requires approximately five minutes to deploy the virtual appliance.
14. Power on the virtual machine.
15. Click the Launch Virtual Machine Console button.
The virtual machine console displays the progress of the virtual appliance
deployment.
32
2: Deploying a Primary Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
16. Wait for 30 seconds to select the default keyboard layout, English (United States).
To select a different keyboard layout, press any key and follow the instructions on
the screen.
17. Verify that the settings are correct. To accept the settings, type y, or wait 30
seconds.
18. When the virtual appliance is deployed, the OS Console displays the Quick Setup
URL and the Quick Setup Access Code. Record the following required
information:
•
The Quick Setup URL includes the IP address that you entered in step 12.
https://<IP Address>/
Quick Setup uses an IP address. The administrative consoles that are available
after Quick Setup completes use a fully qualified domain name (FQDN).
•
The Quick Setup Access Code is required to initiate Quick Setup.
19. Enter the Quick Setup URL in the browser, including https, and press ENTER:
https://<IP Address>/
Note: If you want to confirm the authenticity of the virtual appliance, you must
verify that the SHA-1 fingerprint of the certificate presented during Quick Setup
matches the SHA-1 fingerprint displayed in the OS Console.
Deploy the Virtual Appliance Directly to the VMware ESXi Server
You can deploy a virtual appliance directly to the VMware ESXi server (VMware
Hypervisor). VMware vCenter is not required to deploy the virtual machine. This
process requires several minutes to complete.
Depending on your configuration of the VMware ESXi server and the version of the
server, some of the windows that are described in the following procedure may not
display. The window names may also vary.
Before You Begin
•
Collect the required information about each appliance instance being deployed.
See Secure Appliance Deployment on page 23.
•
Copy the RSA Authentication Manager Open Virtual Appliance (OVA) file to a
location that the VMware vSphere Client can access.
Procedure
1. In the VMware vSphere Client, log on to the VMware ESXi server.
2. Select File > Deploy OVF Template to start the deployment wizard.
3. On the Source window, under Deploy from a File or URL, click Browse, and
locate the RSA Authentication Manager OVA file to deploy. Click Next.
4. On the OVF Template Details window, verify that “RSA Authentication
Manager” and the expected version number displays. Click Next.
2: Deploying a Primary Appliance
33
RSA Authentication Manager 8.1 Setup and Configuration Guide
5. On the End User License Agreement window, scroll to read the agreement. Click
Accept, and Next.
6. On the Name and Location window, enter a Name for the virtual appliance, and
click Next.
7. On the Datastore window, select a directory for the virtual machine files. A
VMware datastore can be a location such as a Virtual Machine File System
(VMFS) volume, a directory on Network Attached Storage, or a local file system
path. Click Next.
8. On the Disk Format window, select a format for storing virtual disks.
9. On the Network Mapping window, select the networks for the virtual appliance.
Click Next.
10. On the Ready to Complete window, review your settings, and click Finish.
VMware requires approximately five minutes to deploy the virtual appliance.
11. Power on the virtual machine.
12. For the virtual appliance, click the Console tab.
The OS Console displays the progress of the boot sequence.
13. Wait for 30 seconds to select the default keyboard layout, English (United States).
To select a different keyboard layout, press any key and follow the instructions on
the screen.
14. When you are prompted by the OS Console, enter the following IPv4 network
settings for the virtual appliance:
•
Fully Qualified Hostname
•
IP Address
•
Subnet Mask
•
Default Gateway
•
(Optional) DNS Server Configuration
Note: If your deployment uses IPv6-compliant agents, you can add IPv6 network
settings in the Operations Console after Quick Setup is complete.
15. Verify that the settings are correct. To accept the settings, type y, or wait 30
seconds.
16. When the virtual appliance is deployed, the OS Console displays the Quick Setup
URL and the Quick Setup Access Code. Record the following required
information:
•
The Quick Setup URL includes the IP address that you entered in step 14.
https://<IP Address>/
Quick Setup uses an IP address. The administrative consoles that are available
after Quick Setup completes use a fully qualified domain name (FQDN).
•
34
The Quick Setup Access Code is required to initiate Quick Setup.
2: Deploying a Primary Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
17. Enter the Quick Setup URL in the browser, including https, and press ENTER:
https://<IP Address>/
Note: If you want to confirm the authenticity of the virtual appliance, you must
verify that the SHA-1 fingerprint of the certificate presented during Quick Setup
matches the SHA-1 fingerprint displayed in the OS Console.
Deploy the Virtual Appliance Through the Hyper-V Virtual Machine
Manager Console
You can deploy a virtual appliance through the Hyper-V System Center Virtual
Machine Manager (VMM) Console. RSA provides a PowerShell script that creates a
virtual machine template that automatically configures the virtual machine. You
complete configuration through the Hyper-V VMM Console. This process requires
several minutes to complete.
Before You Begin
•
Collect the required information about each appliance instance to deploy. See
Secure Appliance Deployment on page 23.
•
Copy the RSA Authentication Manager Hyper-V virtual appliance file,
rsa-am-hyper-v-virtual-appliance-8.1.1.0.0.zip, to an existing Hyper-V VMM
library server or a shared folder on a Microsoft Windows 2012 R2 machine that
can be added as a library server.
•
Unzip the file to the current location.
The contents include a Windows batch file, a PowerShell script, and two virtual
hard drive (VHD) files. The disk1 VHD file is the primary virtual hard drive that
the virtual appliance uses for storage. The disk2 VHD file is a swap drive that
improves virtual appliance startup times.
Note: Do not rename the VHD files.
Procedure
1. Log on to the Microsoft Windows 2012 R2 machine that has the Hyper-V VMM
Console installed.
2. (Optional) If the disk1 and disk2 VHD files are not located on an existing library
server, add the location of the VHD files as follows:
a. Open the Hyper-V VMM Console, and log on to the VMM server.
b. On the Home tab, click Add Library Server.
c. Select or enter the library server logon credentials, and click Next.
d. Search for the server that contains the VHD file, select the server, and click
Next.
2: Deploying a Primary Appliance
35
RSA Authentication Manager 8.1 Setup and Configuration Guide
e. Select the share that contains the downloaded VHD file, and click Next.
f.
Click Add Library Servers.
3. On the Windows taskbar, right-click Windows PowerShell, and select Run as
Administrator.
4. Change directories to the location of the Windows batch file. Type the following,
and press ENTER:
cd 'Windows_Directory_Path'
Where
'Windows_Directory_Path' is the location of the Windows batch file.
5. To create a Hyper-V virtual machine template, type the following, and press
ENTER:
.\create_vm.bat -vmm -server FQDN_or_IP address -port
port_number -libraryserver 'Windows_Directory_Path'
-templatename Template_Name
Where
•
-vmm makes the batch file run in VMM mode.
•
-server FQDN_or_IP address is the fully qualified domain name or IP address
of the VMM server.
•
-port port_number is the optional argument for the VMM server port. If you
do not specify this option, the system uses the default value 8100.
•
-libraryserver 'Windows_Directory_Path' is the location of the library server
managed by the VMM where the VHD files are uploaded.
Note: Do not specify a local folder. The -libraryserver argument must specify
a library server that is a shared location configured in the VMM server.
-templatename Template_Name is the optional argument for the name of the
template. Specify a template name if you might run the batch file more than
one time. If you do not specify a name, the system uses the default value RSA
Authentication Manager Appliance VM Template.
The template name must contain 69 or fewer characters and follow Windows
naming conventions. For example, the filename cannot contain the characters
\ / : * ? " < > and |.
For example, run .\create_vm.bat -vmm -server 192.168.0.0 -libraryserver
'\\windowshyperv.yourorganization.com\libraryshare' to create a Hyper-V
virtual machine template that uses the default port and template name.
•
6. If you are prompted by a security warning, type r to run the script. By default,
PowerShell has a restrictive security policy that does not trust scripts that you
download from the Internet.
7. When you are prompted, enter administrative credentials for the VMM server.
After the script successfully creates the virtual machine template, you can use the
Create Virtual Machine wizard in the Hyper-V VMM Console.
8. If you have not already done so, open the Hyper-V VMM Console, and log on to
the VMM server.
36
2: Deploying a Primary Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
9. Click Library > Templates > VM Templates.
10. Right-click the name of the virtual machine template, and select Create Virtual
Machine. The default name is RSA Authentication Manager Appliance VM
Template.
The Create Virtual Machine wizard launches.
11. On the Identity window, enter a name for the virtual appliance, and click Next.
12. On the Configure Hardware window, keep the default hardware profile, and click
Next. The PowerShell script automatically configured the virtual machine
template.
13. On the Select Destination window, select Place the virtual machine on a host,
and choose a destination. Click Next.
14. On the Select Host window, choose a Hyper-V host as the destination for
deploying the virtual appliance. Click Next.
15. On the Configure Settings window, choose a location to store the virtual appliance
files. Click Next.
16. On the Select Networks window, choose a network connection from the
drop-down list, and click Next. You must connect the virtual appliance to your
network before it is powered on.
17. On the Add Properties window, configure the action to take when the host
machine starts or stops. You can choose whether to prevent the virtual appliance
from being migrated by Performance and Resource Optimization. Click Next.
18. On the Summary window, click Create.
19. After the virtual appliance is successfully created, power on the virtual appliance,
and connect to the virtual appliance through the VMM Console.
20. Wait for 30 seconds to select the default keyboard layout, English (United States).
To select a different keyboard layout, press any key and follow the instructions on
the screen.
21. Read the End User License Agreement (EULA), and type yes to accept it.
22. When the OS Console prompts you, enter the following IPv4 network settings for
the virtual appliance:
•
Fully Qualified Hostname
•
IP Address
•
Subnet Mask
•
Default Gateway
•
(Optional) DNS Server Configuration
Note: If your deployment uses IPv6-compliant agents, you can add IPv6 network
settings in the Operations Console after Quick Setup is complete.
23. Verify that the settings are correct. To accept the settings, type y, or wait 30
seconds.
2: Deploying a Primary Appliance
37
RSA Authentication Manager 8.1 Setup and Configuration Guide
24. When the virtual appliance is deployed, the OS Console displays the Quick Setup
URL and the Quick Setup Access Code. Record the following required
information:
•
The Quick Setup URL includes the IP address that you entered in step 22.
https://<IP Address>/
Quick Setup uses an IP address. The administrative consoles that are available
after Quick Setup completes use a fully qualified domain name (FQDN).
•
The Quick Setup Access Code is required to initiate Quick Setup.
25. Enter the Quick Setup URL in the browser, including https, and press ENTER:
https://<IP Address>/
Note: To confirm the authenticity of the virtual appliance, you must verify that the
SHA-1 fingerprint of the certificate presented during Quick Setup matches the
SHA-1 fingerprint displayed in the OS Console.
Deploy the Virtual Appliance Through the Hyper-V Manager
You can deploy a virtual appliance through the Hyper-V Manager. RSA provides a
PowerShell script that creates a virtual appliance. You complete configuration through
the Hyper-V Manager. This process requires several minutes to complete.
Before You Begin
•
Collect the required information about each appliance instance to deploy. See
Secure Appliance Deployment on page 23.
•
Save a copy of the RSA Authentication Manager virtual appliance file,
rsa-am-hyper-v-virtual-appliance-8.1.1.0.0.zip.
The file contents include a Windows batch file, a PowerShell script, and two
virtual hard drive (VHD) files. The disk1 VHD file is the primary virtual hard
drive that the virtual appliance uses for storage. The disk2 VHD file is a swap
drive that improves virtual appliance startup times.
After you create the virtual appliance, running the new appliance modifies the
VHD files. You need a new set of VHD files for each virtual appliance that you
deploy.
Procedure
1. Log on to the Microsoft Windows 2012 R2 Hyper-V host machine.
2. Copy the RSA Authentication Manager Hyper-V virtual appliance file,
rsa-am-hyper-v-virtual-appliance-8.1.1.0.0.zip, to a location on the Microsoft
Windows 2012 R2 Hyper-V host machine.
3. Unzip the file to the location where you want to create the virtual appliance.
Note: Do not rename the VHD files.
38
2: Deploying a Primary Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
4. On the Windows taskbar, right-click Windows PowerShell, and select Run as
Administrator.
5. Change directories to the location of the Windows batch file. The virtual
appliance is created in the directory where you run the script.
Type the following, and press ENTER:
cd 'Windows_Directory_Path'
Where
'Windows_Directory_Path' is the location of the Windows batch file.
6. To create a Hyper-V virtual machine, type the following, and press ENTER:
.\create_vm.bat -name virtual_machine
Where
-name virtual_machine is the name of the virtual machine. Specify a name if you
might run the batch file more than one time. If you do not specify this option, the
virtual appliance uses the default name RSA Authentication Manager Appliance.
For example, type .\create_vm.bat -name AuthenticationMgrPrimary to create
a virtual appliance with the name AuthenticationMgrPrimary or type
.\create_vm.bat to create a virtual appliance with the default name
RSA Authentication Manager Appliance.
7. If you are prompted by a security warning, type r to run the script. By default,
PowerShell has a restrictive security policy that does not trust scripts that you
download from the Internet.
8. When prompted, type y to confirm that you want to create a new virtual machine.
After the script successfully completes, connect the virtual appliance to your
network.
9. In the Windows Start menu, click Server Manager > Tools > Hyper-V
Manager.
10. In the Hyper-V Manager, select the node and host from the left pane.
11. In the Virtual Machines pane, select the new virtual machine.
12. In the Action pane, under the virtual machine name, click Settings.
13. In the navigation pane, click Add Hardware and configure the Network Adapter,
or click Network Adapter and select a virtual switch. Do not use the legacy
network adapter. The legacy network adapter is not supported.
14. In the Actions pane, under the virtual machine name, click Start.
15. In the Actions pane, under the virtual machine name, click Connect.
16. Wait for 30 seconds to select the default keyboard layout, English (United States).
To select a different keyboard layout, press any key and follow the instructions on
the screen.
17. Read the End User License Agreement (EULA), and type yes to accept it.
2: Deploying a Primary Appliance
39
RSA Authentication Manager 8.1 Setup and Configuration Guide
18. When the OS Console prompts you, enter the following IPv4 network settings for
the virtual appliance:
•
Fully Qualified Hostname
•
IP Address
•
Subnet Mask
•
Default Gateway
•
(Optional) DNS Server Configuration
Note: If your deployment uses IPv6-compliant agents, you can add IPv6 network
settings in the Operations Console after Quick Setup is complete.
19. Verify that the settings are correct. To accept the settings, type y, or wait 30
seconds.
20. When the virtual appliance is deployed, the OS Console displays the Quick Setup
URL and the Quick Setup Access Code. Record the following required
information:
•
The Quick Setup URL includes the IP address that you entered in step 18.
https://<IP Address>/
Quick Setup uses an IP address. The administrative consoles that are available
after Quick Setup completes use a fully qualified domain name (FQDN).
•
The Quick Setup Access Code is required to initiate Quick Setup.
21. Enter the Quick Setup URL in the browser, including https, and press ENTER:
https://<IP Address>/
Note: To confirm the authenticity of the virtual appliance, you must verify that the
SHA-1 fingerprint of the certificate presented during Quick Setup matches the
SHA-1 fingerprint displayed in the OS Console.
Deploy the Hardware Appliance
Use the following procedure to deploy the hardware appliance.
Before You Begin
Collect the information and items that are required for a hardware deployment. For
more information, see Secure Appliance Deployment on page 23.
Procedure
1. Connect a keyboard and monitor to the hardware appliance.
2. Connect the power cord to the appliance and power on the appliance.
40
2: Deploying a Primary Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
3. When the appliance boot screen displays, select Start RSA Authentication
Manager and press ENTER, or wait 10 seconds for Authentication Manager to
load automatically.
Note: Do not use the F2 or F4 function key options that display for language and
keyboard settings in the boot screen. After you start Authentication Manager, you
can change the keyboard language when you are prompted for these settings.
4. By default, the keyboard is configured for English (United States).To retain this
setting, wait 30 seconds. To configure a new language, do the following:
a. Press any key.
b. Type the number that is associated with the language you want to configure,
and press ENTER.
5. Review and accept the license agreement. Do the following:
a. Press ENTER to view each proceeding line of the license agreement or press
the spacebar key to view the next screen of text.
You must press ENTER or the spacebar until you reach the end of the license
agreement.
b. When prompted, type yes to accept the license agreement, and press ENTER.
6. When prompted, configure the following network settings for the appliance:
•
Fully Qualified Hostname
•
IP Address
•
Subnet Mask
•
Default Gateway
•
(Optional) Primary DNS Server
•
(Optional) Secondary DNS Server
7. When prompted to confirm the network settings, verify the settings are correct. To
accept the settings, type y.
8. After the network settings are configured, the Quick Setup URL and the Quick
Setup Access Code display. Record the following required information:
•
The Quick Setup URL includes the IP address that you entered in step 6.
https://<IP Address>/
Quick Setup uses an IP address. The administrative consoles that are available
after Quick Setup completes use a fully qualified domain name (FQDN).
•
The Quick Setup Access Code is required to initiate Quick Setup.
9. If you have not done so already, connect the appliance to the network.
2: Deploying a Primary Appliance
41
RSA Authentication Manager 8.1 Setup and Configuration Guide
Run Quick Setup on the Primary Instance
Quick Setup configures the appliance as an RSA Authentication Manager instance.
Keep the appliance on a trusted network until Quick Setup is complete. The client
computer and browser used to run Quick Setup should also be on a trusted network.
If you do not complete Quick Setup, you will be prompted to verify the network
settings every time you power on the virtual or hardware appliance.
Before You Begin
•
You must have deployed a virtual appliance or hardware appliance.
•
Verify that the browser on the local computer can access the license file (.zip) used
during Quick Setup. For more information, see Secure Appliance Deployment on
page 23.
Procedure
1. Launch Quick Setup. Open a web browser and go to the following URL:
https://<IP ADDRESS>
where <IP ADDRESS> is the IP address of the appliance.
2. If your web browser is configured for an enhanced security level, a warning states
that this URL is not on the list of allowed or trusted sites. To continue, click the
option that allows your browser to connect to an untrusted site. For example, your
browser might ask you to click a link that reads “I Understand the Risks.”
3. When prompted, enter the Quick Setup Access Code, and click Next.
4. On the Primary and Replica Quick Setup window, click Start Primary Quick
Setup.
5. On the Primary Quick Setup page, click Start Step 1.
6. Specify the location of the license file (.zip), and click Upload.
7. Review the license summary, and click Next.
8. On the Date & Time page, do the following:
a. In the Time Zone section, do the following in this order:
•
Select a region, for example, America.
•
Select a location. If the time zone uses Daylight Savings Time, two offsets
from Coordinated Universal Time (UTC) are shown, for example,
(UTC-05/UTC-04) New York.
b. In the Time Source section, choose how you want the time to be set on the
appliance, manually (hardware appliance only) or automatically (hardware or
virtual appliance.
42
2: Deploying a Primary Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
To automatically synchronize the time on a hardware appliance or virtual
appliance to an NTP server:
a. Select Sync to NTP Server.
b. Enter the hostname or IP address for a local or Internet Network Time
Protocol (NTP) server.
You may enter a second NTP server. If Quick Setup cannot connect to an
NTP server, you can add an NTP Server in the Operations Console after
Quick Setup is complete.
c. To test the connection to the NTP server and verify that the correct time is
selected, click Preview Current Date & Time.
To automatically synchronize the time on a virtual appliance to the VMware
or Hyper-V host machine:
a. Select Sync to the physical machine hosting this virtual appliance.
b. To test the connection to the virtual host and verify that the correct time is
selected, click Preview Current Date & Time.
To manually set the time on a hardware appliance:
a. Select Set System Time.
b. From the date box, select the date.
c. From the time drop-down boxes, select the hour and minute.
c. Click Next.
9. On the OS Password page, create and confirm the operating system password, and
click Next.
Note: The operating system password is required to log on to the primary
instance.
Record the operating system password, so that you can access it when you need it.
For security reasons, RSA does not provide a utility for recovering the operating
system password.
10. On the Initial Administration Accounts page, create the initial administration
credentials for the Security Console Super Admin and the Operations Console
(OC) administrator. Click Next.
Important: The User ID must be unique. It can contain 1 to 255 ASCII characters.
The characters &% > < ` are not allowed. If a User ID contains unsupported
characters, the user cannot authenticate.
Record these User IDs and passwords.
Note: After you complete Quick Setup, you can create additional Super Admin
and Operations Console administrator accounts in the Security Console.
2: Deploying a Primary Appliance
43
RSA Authentication Manager 8.1 Setup and Configuration Guide
11. Review the information that you have entered. If you want to change anything,
click Back, and make the change on the appropriate page. If necessary, use the
navigation links at the top of the page.
12. Click Start Configuration.
After the instance is configured, direct links are provided to the Security Console
and the Operations Console.
Next Steps
•
Web browsers used to administer Authentication Manager must have JavaScript
enabled. See your web browser documentation for instructions on enabling
JavaScript.
•
After Quick Setup completes, you can change the appliance network settings in
the Operations Console. Network Setting changes made in the VMware vSphere
Client will no longer take effect.
Certificate Management for Secure Sockets Layer
Secure Sockets Layer (SSL) is enabled by default for communication ports that are
used for RSA Authentication Manager administration and replication. When you
deploy an instance of Authentication Manager, communication is secured by a
long-lived SSL certificate. This certificate is unique to your deployment, and it is
signed by an internal RSA certificate authority (CA).
Because this SSL certificate is signed by an internal RSA CA, your browser may
present a warning message that the default certificate cannot be verified. If an Online
Certificate Status Protocol (OCSP) client is deployed, you may receive a message that
revocation list information is not available. This is expected behavior.
To continue, click the option that allows your browser to proceed or to connect to an
untrusted site. For example, your browser might ask you to click a link that reads “I
Understand the Risks.”
To prevent this warning message from appearing, you must add the internal RSA CA
to your browser’s trusted root certificate list, or replace the RSA certificate with one
that is signed by a certificate authority that is trusted by your browser.
See your browser documentation for instructions about adding the internal RSA CA to
your browser’s list of trusted root certification authorities.
44
2: Deploying a Primary Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
Log On to the Consoles
This procedure describes how to access the Security Console, Operations Console,
and the Self-Service Console.
Procedure
1. Open a supported web browser, and enter one of the URLs listed in the following
table. Each console supports more than one URL.
Console
URLs
Security Console
https://<fully qualified domain name>
https://<fully qualified domain name>/sc
https://<fully qualified domain name>:7004/console-ims
Operations Console
https://<fully qualified domain name>/oc
https://<fully qualified domain name>:7072/operations-console
Self-Service Console If there is no web tier, enter:
https://<fully qualified domain name>/ssc
https://<fully qualified domain name>:7004/console-selfservice
After installing a web tier, enter:
https://<fully qualified virtual host name>
https://<fully qualified virtual host name>/ssc
https://<fully qualified virtual host name>/console-selfservice
If you change the default load balancer port, enter:
https://<fully qualified virtual host name>:<virtual host port>/
https://<fully qualified virtual host name>:<virtual host port>/ssc
https://<fully qualified virtual host name>:<virtual host
port>/console-selfservice
For example, if the fully qualified domain name of your appliance installation is
“host.mycompany.com,” to access the Security Console, enter one of the
following URLs in your web browser:
https://host.mycompany.com
https://host.mycompany.com/sc
https://host.mycompany.com:7004/console-ims
2. If your web browser is configured for an enhanced security level, you must add an
entry to the list of allowed or trusted sites. See your browser documentation for
instructions about adding allowed or trusted sites.
2: Deploying a Primary Appliance
45
RSA Authentication Manager 8.1 Setup and Configuration Guide
3. To access the Security Console, enter the Super Admin User ID and password that
you specified during Quick Setup. To access the Operations Console, enter the
Operations Console User ID and password that were entered during Quick Setup.
For more information on the Console accounts and passwords, see Administrative
Accounts on page 105.
Important: The Security Console may take up to 10 minutes to complete initial
startup.
46
2: Deploying a Primary Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
3
Deploying a Replica Appliance
Perform Deployment Tasks
Perform these steps to deploy an appliance and deploy an RSA Authentication
Manager replica instance.
Procedure
1. Deploy the appliance. Depending on your deployment, do one of the following:
•
For a VMware virtual appliance, you can either Deploy the Virtual Appliance
Through VMware vCenter Server or Deploy the Virtual Appliance Directly to
the VMware ESXi Server.
•
For a Hyper-V virtual appliance, you can either Deploy the Virtual Appliance
Through the Hyper-V Virtual Machine Manager Console or Deploy the
Virtual Appliance Through the Hyper-V Manager.
•
For a hardware appliance, see Deploy the Hardware Appliance.
2. Generate and Download a Replica Package File
3. Configure the appliance with Quick Setup, a software wizard that creates access
permission and specifies whether the appliance is a primary instance or a replica
instance. See Run Quick Setup on the Replica Instance.
4. Attach the Replica Instance to the Primary Instance
3: Deploying a Replica Appliance
47
RSA Authentication Manager 8.1 Setup and Configuration Guide
Generate and Download a Replica Package File
Before you can add a replica instance to the deployment, you must create a replica
package file on the primary instance. This file has configuration data that enables the
replica instance to connect to the primary instance. The replica instance must have
access to this file.
Before You Begin
You must be an Operations Console administrator.
Procedure
1. On the primary instance, log on to the Operations Console.
2. Click Deployment Configuration > Instances > Generate Replica Package.
3. Click Download to download the replica package file, and click Save to save the
replica package to your local machine. The name of the replica package file is
replica_package.zip.
4. Click Done to return to the Operations Console Home page.
Run Quick Setup on the Replica Instance
Quick Setup performs the following tasks to add a replica appliance to the
deployment:
•
Quick Setup configures the appliance as an RSA Authentication Manager replica
instance.
•
Quick Setup attaches the replica instance to the primary instance.
After Quick Setup configures the replica instance, you can choose one of the
following options:
•
Attach the replica instance immediately to the primary instance.
•
Defer attaching the replica instance until a later time.
If you choose to defer attaching the replica instance, Quick Setup powers off the
replica instance. The next time you power on the replica instance, you can access
Quick Startup to complete the attach process.
As a best practice, RSA recommends that you keep the appliance on a trusted network
until Quick Setup is complete. The client computer and browser used to run Quick
Setup should also be on a trusted network.
If you do not complete Quick Setup, you will be prompted to verify the network
settings every time you power on the virtual or hardware appliance.
48
3: Deploying a Replica Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
Before You Begin
•
Collect the required information about each replica instance that you want to set
up. See Deployment Checklist for a Replica Instance on page 26.
•
You must have deployed the appliance:
•
–
For a VMware virtual appliance, see Deploy the Virtual Appliance Through
VMware vCenter Server on page 31 or Deploy the Virtual Appliance Directly
to the VMware ESXi Server on page 33.
–
For a Hyper-V virtual appliance, see Deploy the Virtual Appliance Through
the Hyper-V Virtual Machine Manager Console on page 35 or Deploy the
Virtual Appliance Through the Hyper-V Manager on page 38.
–
For a hardware appliance, see Deploy the Hardware Appliance on page 40.
Generate and Download a Replica Package File on page 48.
Procedure
1. Launch Quick Setup. Open a browser and go to the following URL:
https://<IP ADDRESS>
where <IP ADDRESS> is the IP address of the replica appliance.
2. If your web browser is configured for an enhanced security level, a warning states
that this URL is not on the list of allowed or trusted sites. To continue, click the
option that your browser presents that allows you to connect to an untrusted site.
For example, your browser might ask you to click a link that reads “I Understand
the Risks.”
3. When prompted, enter the Quick Setup Access Code, and click Next.
4. On the Primary and Replica Quick Setup window, click Start Replica Quick
Setup.
5. On the Replica Quick Setup page, click Start Step 1.
6. On the Date & Time Settings page, do the following in this order:
a. In the Time Zone section, do the following in this order:
•
Select a region, for example, America.
•
Select a location. If the time zone uses Daylight Savings Time, two offsets
from Coordinated Universal Time (UTC) are shown, for example,
(UTC-05/UTC-04) New York.
b. In the Time Source section, choose how you want the time to be set on the
appliance, manually (hardware appliance only) or automatically (hardware or
virtual appliance.
To automatically synchronize the time on a hardware appliance or virtual
appliance to an NTP server:
a. Select Sync to NTP Server.
b. Enter the hostname or IP address for a local or Internet Network Time
Protocol (NTP) server.
3: Deploying a Replica Appliance
49
RSA Authentication Manager 8.1 Setup and Configuration Guide
You may enter a second NTP server. If Quick Setup cannot connect to an
NTP server, you can add an NTP Server in the Operations Console after
Quick Setup is complete.
c. To test the connection to the NTP server and verify that the correct time is
selected, click Preview Current Date & Time.
To automatically synchronize the time on a virtual appliance to the VMware
or Hyper-V host machine:
a. Select Sync to the physical machine hosting this virtual appliance.
b. To test the connection to the virtual host and verify that the correct time is
selected, click Preview Current Date & Time.
To manually set the time on a hardware appliance:
a. Select Set System Time.
b. From the date box, select the date.
c. From the time drop-down boxes, select the hour and minute.
c. Click Next.
7. Create and confirm the operating system password, and click Next.
Note: The operating system password is required to log on to the replica instance.
Record the operating system password for future use. For security reasons, RSA
does not provide a utility for recovering the operating system password.
8. Review the information that you have entered. If you want to change anything,
click Back, and make the change on the appropriate page. If necessary, use the
navigation links at the top of the page.
9. Click Start Configuration.
After the instance is configured, do one of the following:
•
Click Begin Attach to attach the replica instance to the primary instance. For
more information, see Attach the Replica Instance to the Primary Instance on
page 51.
•
Click Defer Attach to attach the replica instance at another time. When
prompted, confirm your choice. The replica instance powers off. You can
attach the replica instance the next time you power on the replica instance.
Next Step
•
50
Replica Attachment Issues and Solutions on page 52.
3: Deploying a Replica Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
Attach the Replica Instance to the Primary Instance
Attaching the replica instance to the primary instance enables the replica instance to
synchronize data with the primary instance. The replica instance records all
authentications locally and sends the authentication and log data to the primary
instance at regular intervals. When the primary instance is unavailable, the replica
instance holds this data locally until the primary instance becomes available.
Important: The replica instance cannot authenticate users during the attachment
process.
The instances use the TCP/IP protocol over an encrypted link for secure database
synchronization. Instances can communicate over a local area network (LAN) or a
wide area network (WAN). For information on firewalls, see Port Usage on page 95.
Before You Begin
Confirm the following:
•
You generated a replica package file on the primary instance and downloaded the
replica package to your local machine. For instructions, see Generate and
Download a Replica Package File on page 48.
•
The primary and replica instances can resolve and connect to each other on the
following ports:
–
7002/TCP
–
1812/TCP
–
1813/TCP
Note: Ports 1812 and 1813 are used by RSA RADIUS. If you do not plan to use
RSA RADIUS, you must still open these ports on your network, for example, on
any firewalls sitting between the primary instance and the replica instance, for
attachment to succeed.
•
The RSA RADIUS service is running on the primary instance.
Even if you do not plan to use RADIUS, the service must be running for the
replica attachment to succeed.
•
The clocks on the primary and replica instances are synchronized. If the clocks are
off by more than 10 minutes, the attachment fails.
•
If you deferred attaching the replica instance after it was configured using Quick
Setup, power on the replica instance and access Quick Setup. Quick Setup
resumes at the Attach to Primary Instance page.
3: Deploying a Replica Appliance
51
RSA Authentication Manager 8.1 Setup and Configuration Guide
Procedure
1. On the Attach to Primary Instance page under Upload Replica Package, click
Browse, and select the replica package file to upload from your local machine.
Click Next.
2. Under Provide Credentials, enter your Operations Console administrator User
ID and password, and click Next.
Next Steps
•
Check the replication status by viewing the Replication Status Report for the
replica instance. In the Operations Console for the replica instance, click
Deployment Configuration > Instances > Status Report.
•
If you are using RSA RADIUS, verify the replication status of the RADIUS
server. In the Security Console for the replica instance, click RADIUS >
RADIUS Servers.
•
Make sure that the web browsers used to access the Security Console or the
Operations Console have JavaScript enabled. See your web browser
documentation for instructions on enabling JavaScript.
•
After the replica instance is attached to the primary instance, network setting
changes made in the VMware vSphere Client will no longer take effect. Use the
Operations Console in the primary instance to change the network settings.
Replica Attachment Issues and Solutions
If replica attachment requires additional information, perform the tasks listed in the
following table.
Issue
Solution
The replica instance cannot resolve the
primary instance hostname.
In the Associated Primary IP Address field,
enter the primary instance IP address, and
click Next.
The replica instance cannot reach the primary In the Retry Options field, correct the
instance.
primary instance IP address. Choose one of
the following options:
• Address network connectivity issues, and
then try to reach the primary instance
again.
• Select the Override IP Address field, and
enter the correct IP address for the primary
instance. This information is saved in the
hosts file of this appliance, and it overrides
the DNS configuration, if a DNS server is
available.
Click Next, and enter your Operations
Console administrator credentials.
52
3: Deploying a Replica Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
Issue
Solution
The primary instance cannot resolve the
replica instance hostname
1. Update the DNS server, if applicable, or
use the primary instance Operations
Console to edit the hosts file with the
correct information for the replica
instance.
For more information, see the Operations
Console Help topic “Edit the Appliance
Hosts File.”
2. Click Next.
The replica instance cannot communicate
with the primary instance on the RADIUS
ports.
Verify that the RSA RADIUS service is
running on the primary instance. To do so:
The primary instance cannot communicate
with the replica instance on the
communication port 7002/TCP, and the
RADIUS ports 1812/TCP and 1813/TCP.
1. Verify that the network configuration
permits remote connections over the
communication port 7002/TCP, and the
RADIUS ports 1812/TCP and 1813/TCP.
2. Click Next.
3: Deploying a Replica Appliance
1. Log on to the Operations Console on the
primary instance.
2. Select Deployment Configuration >
RADIUS Servers.
3. If prompted, enter your Super Admin user
ID and password.
4. Click the server that you want to restart.
5. From the context menu, select Restart
Server.
6. Select Yes, restart RADIUS server, and
click Restart Server.
After less than one minute, the RSA
RADIUS Service starts.
7. Verify that the network configuration
permits remote connections over ports
1812/TCP and 1813/TCP.
8. Click Next.
53
RSA Authentication Manager 8.1 Setup and Configuration Guide
Issue
Solution
If the time difference between the primary
instance and replica instance is greater than
10 minutes, replica attachment fails.
You can change the time.
On the primary instance, log onto the primary
instance Operations Console and select
Administration > Date & Time.
On the replica instance, redeploy the replica
instance with the correct time. To do so:
1. Delete the failed replica instance from the
Operations Console on the primary
instance. For instructions, see the
Operations Console Help topic “Delete a
Replica Instance.”
2. Do the following:
• For a hardware appliance, perform a
factory reset. For more information,
see the Operations Console Help topic
“Factory Reset.”
• For a VMware virtual appliance, in
VMware vCenter or on the ESXi
server, shut down and delete the virtual
appliance for the failed replica
instance.
• For a Hyper-V virtual appliance, in the
Hyper-V System Center Virtual
Machine Manager Console or the
Hyper-V Manager, shut down and
delete the virtual appliance for the
failed replica instance.
3. Deploy a new replica instance.
54
3: Deploying a Replica Appliance
RSA Authentication Manager 8.1 Setup and Configuration Guide
4
Configuring a Virtual Host and Load
Balancer
Virtual Host and Load Balancer Overview
The virtual host is the gateway to the DMZ for users outside of the network who use
risk-based authentication (RBA), the Self-Service Console, and dynamic seed
provisioning. You must configure a virtual host and assign each web tier to the virtual
host.
Load balancing distributes web tier traffic to the web tier servers. The web-tier
deployment can include a load balancer or you can use round robin DNS. The virtual
host can be associated with up to 2 load balancers.
For more information on network configurations that require a load balancer, see the
Planning Guide.
Load Balancer Requirements
A load balancer must meet the following requirements:
User persistence. The load balancer must send a client to the same server
repeatedly during a session. The load balancer must send the client to the same
Authentication Manager instance or web-tier server, depending on your
deployment scenario, during an authentication session.
X-Forwarded-For headers. Load balancers in the application layer cause all
requests to appear to come from the load balancer. You must configure load
balancers to send the original client IP address in the “X-Forwarded-For” header.
This is the default for most application layer load balancers.
In addition to the required features, consider the following:
HTTPS Redirection. The load balancer must be able to redirect HTTPS requests
to another URL. This allows users to use the load balancer hostname to access the
Self-Service Console.
Configure a Load Balancer and Virtual Host
When adding a load balancer, you must configure a virtual hostname, IP address, and
listening port. The load balancer acts as the virtual host providing an entry point to the
demilitarized zone (DMZ). You must configure the virtual host before you can install
a web tier.
If your deployment has a load balancer, the virtual hostname must resolve to the
public IP address of the load balancer.
4: Configuring a Virtual Host and Load Balancer
55
RSA Authentication Manager 8.1 Setup and Configuration Guide
If your deployment does not have a load balancer, the virtual hostname must resolve to
the public IP address of your web tier.
If you change the name of the load balancer or use another load balancer, you must
change the virtual hostname accordingly.
Before You Begin
•
You must be a Super Admin.
•
The virtual hostname must be configured in the Domain Name System (DNS) to
point to the load balancer.
Procedure
1. In the Operations Console on the primary instance, click Deployment
Configuration > Virtual Host & Load Balancing.
2. If prompted, enter your Super Admin User ID and password.
3. On the Virtual Host & Load Balancing page, do the following:
a. Select Configure a virtual host and load balancers.
b. Enter a fully qualified virtual hostname unique to the deployment.
c. (Optional) Change the default port number.
d. Enter up to two load balancer IP addresses. If you are not using a load
balancer, leave the IP address blank.
e. Click Add.
4. Click Save.
The system saves the virtual hostname and key material in the keystore file.
5. On the confirmation page, read Mandatory Next Steps.
6. Click Done.
Next Steps
In the Operations Console, perform the appropriate mandatory next steps.
56
•
If you updated load balancer details, you must reboot the primary and replica
instances. In the Operations Console, click Maintenance > Reboot Appliance
and reboot each instance.
•
If you updated the virtual hostname, generate a new integration script for each
web-based application using RBA, and then redeploy the integration scripts. For
more information, see the Administrator’s Guide.
•
If the deployment includes a web tier, update the web tier. In the Operations
Console, click Deployment Configuration > Web-Tier Deployments > Manage
Existing. Click the update link for each web tier.
•
If the deployment includes a web tier, replace the certificate on the load balancer
and on the firewall with the virtual host certificate.
4: Configuring a Virtual Host and Load Balancer
RSA Authentication Manager 8.1 Setup and Configuration Guide
•
If the deployment uses dynamic seed provisioning, update the hostname and port
for the CT-KIP URL with the hostname and port that you specified for the virtual
host. In the Security Console, go to Setup > System Settings. Click Tokens.
•
If the deployment uses the RSA Self-Service Console, update the Self-Service
Console URL with the hostname and port you specified for the virtual host. In the
Security Console, go to Setup > Self-Service Settings. Click E-Mail
Notifications for User Account Changes.
Load Balance Using the Web Tier with Round Robin DNS
If you do not want to use a load balancer, you can set up the web-tier servers to
distribute risk-based authentication (RBA) requests using round robin Domain Name
System (DNS).
To set up load balancing using round robin DNS, associate the virtual hostname with
the publicly accessible IP addresses of the web-tier servers in your DNS, and then
enable round robin. The DNS server then sends RBA requests to web-tier servers.
The following figure shows a sample deployment of Authentication Manager using
round robin DNS load balancing.
4: Configuring a Virtual Host and Load Balancer
57
RSA Authentication Manager 8.1 Setup and Configuration Guide
5
Installing Web Tiers
Web Tier Overview
A web tier is a secure platform for installing and deploying the Self-Service Console,
dynamic seed provisioning, and the risk-based authentication (RBA) service.
The web tier protects the private network by receiving and managing inbound internet
traffic before it enters the private network. This prevents end users from accessing the
private network through the Self-Service Console or web-based applications, such as
SSL-VPNs, thin clients, or web portals. The web-tier server only sends a subset of the
traffic, such as authentication traffic, securely to your private network.
In addition to providing network security, deploying Authentication Manager on a
web-tier server in your network demilitarized zone (DMZ) offers the following
benefits:
•
You can customize the end-user interface for the RBA service and web-based
applications.
•
Improves system performance by removing some processing tasks from the back
end server.
Web-tier installation requires a primary instance. It is preferable that there is at least
one replica instance of Authentication Manager located in your private network, as
well as a load balancer and two web-tier servers located in your DMZ. An instance
can have up to 16 web tiers. You need Super Admin permissions to manage the
Authentication Manager and the web-tier servers.
Web tiers are not required, but your deployment might need them to satisfy your
network configuration and requirements. For more information on the Authentication
Manager deployment types, see the Planning Guide.
5: Installing Web Tiers
59
RSA Authentication Manager 8.1 Setup and Configuration Guide
The following diagram shows traffic flow and ports in a typical web-tier deployment.
Self-Service, Dynamic Seed Provisioning, and RBA Traffic in a Web Tier
In Authentication Manager, self-service and dynamic seed provisioning traffic is
routed to the primary instance because these services can only run on the primary
instance. RBA can run on any instance, but Authentication Manager always routes
RBA traffic to the preferred RBA instance to distribute the workload.
The preferred RBA instance is the first instance to which Authentication Manager
directs RBA traffic. You must choose a preferred RBA instance when you deploy a
web tier. RSA recommends that you select a different preferred RBA instance for each
web tier. You can select any Authentication Manager instance as a preferred RBA
instance.
60
5: Installing Web Tiers
RSA Authentication Manager 8.1 Setup and Configuration Guide
The following diagram shows how Self-Service, dynamic seed provisioning, and RBA
traffic flows through a web tier.
Public
DMZ
Private
Self-Service
Always goes to
the primary
instance
P
Dynamic Seed
Provisioning
Always goes to
the preferred
RBA instance
first
R
2
Preferred Preferred
RBA
RBA
Instance Instance
Always goes to
the primary
instance
Risk-Based
Authentication
R
1
Web Tier 1
Load Balancer/
Virtual Host
Web Tier 2
Directs
traffic to
a web
tier
K ey
P
P rimary Ins tanc e
R
Replic a Ins tanc e
If ever the preferred RBA instance is unavailable, Authentication Manager directs
RBA traffic to the next instance on the server list.
Note that if you delete a replica that is a preferred RBA instance, the associated web
tier is also deleted. RBA traffic flow through the deleted web tier is stopped. If the
deployment has a load balancer and virtual host, make sure that they no longer point to
the deleted replica and associated web tier.
Web-Tier Hardware and Operating System Requirements
The following table lists the minimum requirements for the web-tier server. RSA
recommends that you adjust these requirements upwards based on expected usage.
Description
Requirements
Hardware
• Hard Drive: 2 GB for web tier installation
• Hard Drive: 4 GB-20 GB free space for logs and
updated component downloads
• RAM: 2 GB
• CPU: A CPU with a dual-core processor or better, or
2 or more CPUs.
Ports
External Firewall: 443 HTTPS (TCP)
DMZ: 443 HTTPS (TCP)
Internal Firewall: 7022 T3S (TCP)
5: Installing Web Tiers
61
RSA Authentication Manager 8.1 Setup and Configuration Guide
Description
Requirements
Operating Systems
•
•
•
•
•
Red Hat Enterprise Linux 5 Server (64-bit)
Red Hat Enterprise Linux 6 Server (64-bit)
Windows Server 2008 R2 (64-bit)
Windows Server 2012 (64-bit)
Windows Server 2012 R2 (64-bit)
Performing Web Tier Pre-Installation Tasks
Before installing a web tier, perform the following tasks to set up the web-tier
environment.
Procedure
1. Verify that you have Super Admin permissions, and permissions to install
software.
2. Verify that you have access to the Operations Console.
3. On Linux systems, verify that the open files hard limit for the local user is at least
4096.
4. Make sure that your web-tier servers meet the recommended hardware and
operating system requirements. For more information, see Web-Tier Hardware
and Operating System Requirements on page 61.
5. Set up the web-tier servers in the network DMZ.
6. Confirm that the date and time on the web-tier server match the date and time on
the instance with which the web tier will be associated (primary or replica) within
one minute. The time zones do not have to be the same. For example, the web-tier
server time can be 7:00 am (GMT), and the associated instance time can be 9:00
am (GMT + 2).
7. Configure the virtual host. The virtual hostname can be a load balancer hostname
or a round-robin Domain Name System (DNS). For instructions, see Chapter 4,
Configuring a Virtual Host and Load Balancer.
8. (Optional) On the virtual host, replace the default certificate. For instructions, see
the Administrator’s Guide.
9. On the load balancer and on the firewall, replace the certificate with the virtual
host certificate. For instructions, see your load balancer and firewall
documentation.
62
5: Installing Web Tiers
RSA Authentication Manager 8.1 Setup and Configuration Guide
Installing the Web Tier
The following procedure lists the tasks for installing the web tier that is associated
with the primary instance. You must perform these tasks before you associate a replica
instance with a web tier.
Before You Begin
•
Confirm that the virtual host and load balancer are configured.
•
Decide which instance to select as the preferred RBA instance for each web tier.
Procedure
1. On the public and private DNS servers, enter the web-tier hostname and IP
address.
2. On the primary instance, add a web-tier deployment record and generate a
web-tier deployment package. For instructions, see Add a Web-Tier Deployment
Record on page 63.
3. On the web-tier server, run the RSA Authentication Web-Tier Installer for your
platform. For instructions, see the following:
Install a Web Tier on Windows Using the Graphical User Interface on page 66.
Install a Web Tier on Windows Using the Command Line on page 67.
Install a Web Tier on Linux Using the Graphical User Interface on page 68.
Install a Web Tier on Linux Using the Command Line on page 70.
4. Modify the Self-Service Console URL to point to the virtual host and virtual host
port. For instructions, see the Security Console Help topic “Configure E-mail
Notifications for Self-Service User Account Changes.”
5. If your deployment uses dynamic seed provisioning, modify the token-key
generation URL to point to the virtual hostname, virtual host port, and self-service
console. For instructions, see the Security Console Help topic “Configure Token
Settings.”
Add a Web-Tier Deployment Record
A web-tier deployment record must exist in the database on the primary instance
before you can install a web tier. The web-tier deployment record establishes
communication from the primary instance to web tier.
An instance can have up to 16 web tiers. Each web tier requires a web-tier deployment
record.
In the last step of this procedure you can either generate the web-tier deployment
package now or generate it at a later date. The web-tier deployment package contains
the information that RSA Authentication Manager uses to connect a web tier to the
associated instance. The web-tier deployment package is required prior to installing
the web tier. If you generate the web-tier package now, you can install the web tier
now.
5: Installing Web Tiers
63
RSA Authentication Manager 8.1 Setup and Configuration Guide
Before You Begin
•
You must be a Super Admin.
•
If you are installing a new web-tier deployment, configure a virtual hostname,
listening port, and load balancer. For instructions, see Configure a Load Balancer
and Virtual Host on page 55.
Procedure
1. On the primary instance, in the Operations Console, click Deployment
Configuration > Web-Tier Deployments > Add New.
2. If prompted, enter your Super Admin User ID and password.
3. On the Add New Web-Tier Deployment page, in the Details section, enter the
following information:
•
Deployment name. The name you want for the web-tier deployment (0-255
characters. The & % > < ’ and ” characters are not allowed).
•
Hostname. Fully qualified hostname of the web-tier server where you are
installing the web-tier deployment.
•
Preferred RBA Instance. The instance connected to this web-tier
deployment to which risk-based authentication (RBA) traffic is directed.
4. In the Web-Tier Service Options section, turn any of the following services on or
off.
•
Self-Service Console
•
Risk-based authentication
•
Dynamic seed provisioning
5. In the Virtual Host section, confirm the following information.
•
Virtual Hostname. Must be the fully qualified name of the virtual host.
•
Port Number. The default is 443.
6. Do one of the following:
•
Click Save. The system saves the record in the database on the associated
primary instance. The trust certificate is updated when you generate a
web-tier deployment package.
•
Click Save & Generate Web-Tier Package. The Generate Web-Tier
Deployment Package screen is displayed.
Note: If the web-tier hostname is not resolved, a confirmation screen displays.
Follow the instructions on the screen.
64
5: Installing Web Tiers
RSA Authentication Manager 8.1 Setup and Configuration Guide
Next Steps
•
Confirm the details of this web-tier deployment record. For instructions, see the
Operations Console Help topic “View Web Tier Deployments.”
•
If you chose to save the web-tier deployment record without generating the
web-tier deployment package, generate the web-tier deployment package before
installing the web tier.
•
Install the web tier. For instructions, see Installing the Web Tier on page 63.
Web-Tier Installation Checklist
RSA Authentication Manager includes web-tier installers for Windows and Linux,
which are located in the RSA Authentication Manager 8.1 Extras download kit.
Before you launch a web-tier installer, confirm the following:
•
You have obtained the RSA Authentication Manager 8.1 Extras download kit
from RSA Download Central at https://download.rsasecurity.com.
•
The web tier pre-installation tasks are completed.
•
The web-tier server meets the system requirements.
•
The public and private DNS servers are updated with the web-tier server IP
address.
•
A web-tier deployment package exists and has been transferred from the primary
instance to the web-tier server.
•
The Authentication Manager instance to which you will associate the web tier is
running.
•
You know the following information:
–
Directory name and location where you want the web-tier software installed
–
Fully qualified hostname of the web-tier server
–
Primary NIC IP address (IPv4) of the web-tier server
–
Web-tier deployment package name, location, and web-tier package password
–
For Linux, local user name (do not use root)
•
The hostname in the web-tier deployment package matches the hostname on the
target server.
•
For Linux, you have root privileges.
After you confirm the items in the checklist, launch the installer you want to use and
install the web tier.
•
Install a Web Tier on Windows Using the Graphical User Interface
•
Install a Web Tier on Windows Using the Command Line
•
Install a Web Tier on Linux Using the Graphical User Interface
•
Install a Web Tier on Linux Using the Command Line
5: Installing Web Tiers
65
RSA Authentication Manager 8.1 Setup and Configuration Guide
Install a Web Tier on Windows Using the Graphical User Interface
During installation, you run the RSA Authentication Web-Tier Installer on the
web-tier server. This installs dynamic seed provisioning, the Self-Service Console and
risk-based authentication (RBA) service.
Use only numbers and English characters when specifying paths and filenames.
Single-byte and double-byte characters are not supported.
Before You Begin
•
Complete the Web-Tier Installation Checklist on page 65.
•
Copy the Webtier folder from the RSA Authentication Manager 8.1 Extras
download kit to the appliance. The linux-x86_64 folder is not needed.
Procedure
1. In the location where you copied the RSA Authentication Manager 8.1 Extras
download kit, go to Webtier/windows-x86_64 and locate install_webtier.bat.
2. Do one of the following:
•
If User Access Control (UAC) is on, right click install_webtier.bat and select
Run As Administrator.
•
If User Access Control (UAC) is off, double-click install_webtier.bat.
3. On the Welcome screen, read the overview and navigation instructions. Click
Next.
4. On the License Agreement screen, read the license agreement, and click Next.
5. On the Installation Folder screen, specify the installation folder and click Next.
6. On the Choose Web-Tier Package File screen, do the following:
a. Select the Web-Tier Package for the instance to which this web-tier server is
associated.
b. Type the Password.
c. Click Next.
7. On the Summary screen, do one of the following:
•
If the summary is correct, click Next.
•
If the summary is incorrect, click Previous, and correct the information.
8. On the Installation Progress screen, wait for the progress bar to indicate that the
installation is finished and click Next.
9. On the Run Configuration screen, wait for the configuration to complete and
click Next.
10. On the Installation Summary screen, click Done.
66
5: Installing Web Tiers
RSA Authentication Manager 8.1 Setup and Configuration Guide
Next Steps
After you exit the web-tier installer, the Web-Tier Update Service connects to the
primary server to install the necessary services. Use the Operations Console to check
the status of this process.
In the Operations Console, click > Deployment Configurations > Web-Tier
Deployments > Manage Existing to see the web tier installation status.
Install a Web Tier on Windows Using the Command Line
During installation, you run the RSA Authentication Web-Tier Installer on the
web-tier server. This installs dynamic seed provisioning, the Self-Service Console and
risk-based authentication (RBA) service.
Use only numbers and English characters when specifying paths and filenames.
Single-byte and double-byte characters are not supported.
Before You Begin
•
Complete the Web-Tier Installation Checklist on page 65.
•
Copy the Webtier folder from the RSA Authentication Manager 8.1 Extras
download kit to the appliance. The linux-x86_64 folder is not needed.
Procedure
1. In the location where you copied the RSA Authentication Manager 8.1 Extras
download kit, go to Webtier/windows-x86_64 and launch install_webtier.bat in
console mode.
2. On the command line, type the following and press ENTER.
install_webtier.bat -console
3. On the Welcome screen, press ENTER.
4. On the License Agreement screen, press ENTER to continue.
5. On each successive License Agreement screen, you can do the following:
a. Press ENTER to continue to the next page of the License Agreement.
On the last screen, type YES and press ENTER to accept the terms of the
license agreement.
b. Type Q to quit the License Agreement.
Type YES and press ENTER to accept the terms of the license agreement.
6. On the Installation Folder screen, enter the location of the installation folder and
press ENTER.
7. On the Choose Web Tier Package screen, do the following:
a. Enter the web-tier package location and file name, and press ENTER.
b. Enter the web-tier package password, and press ENTER.
c. Press ENTER.
5: Installing Web Tiers
67
RSA Authentication Manager 8.1 Setup and Configuration Guide
8. On the Summary screen, review the summary and do one of the following:
•
If the summary is correct, type 1 to continue and press ENTER.
The installation begins and the Finish screen displays when the installation is
successful.
•
If the summary is incorrect, type 2 and press ENTER to quit.
The installation terminates and you must begin again.
9. On the Finish screen, press ENTER to exit.
Next Steps
After you exit the web tier installer, the Web-Tier Update Service connects to the
primary server to install the necessary services. Use the Operations Console to check
the status of this process.
In the Operations Console, click > Deployment Configurations > Web-Tier
Deployments > Manage Existing to see the web tier installation status.
Install a Web Tier on Linux Using the Graphical User Interface
During installation, you run the RSA Authentication Web-Tier Installer on the
web-tier server. This installs dynamic seed provisioning, the Self-Service Console and
risk-based authentication (RBA) service.
•
Use only numbers and English characters when specifying paths and filenames.
Single-byte and double-byte characters are not supported.
•
The install user must have execute permission for the folder into which the web
tier is installed.
•
Do not save the web-tier installer and the web-tier package under the /root
directory.
•
Do not use spaces in the installation path.
Before You Begin
•
Verify that the open files hard limit for the local user is at least 4096.
•
Complete the Web-Tier Installation Checklist on page 65.
•
Copy the Webtier folder from the RSA Authentication Manager 8.1 Extras
download kit to the /tmp directory on the appliance. You can exclude the
windows-x86_64 folder.
Procedure
1. Log on as root.
2. On the command line, change directories to the location where you copied the
Webtier folder from the RSA Authentication Manager 8.1 Extras download kit.
Type the following and press ENTER:
/tmp/Webtier/linux-x86_64
68
5: Installing Web Tiers
RSA Authentication Manager 8.1 Setup and Configuration Guide
3. Specify read, write, and execute access for the installation files. On the command
line, do the following:
•
For the install_webtier.sh file, type the following, and press ENTER:
chmod 700 ./install_webtier.sh
•
For the /tmp/Webtier/linux-x86_64/jdk/bin directory, type the following,
and press ENTER:
chmod 700 ./*
4. On the command line, type the following, and press ENTER:
./install_webtier.sh
5. On the RSA Authentication Manager Web-Tier Installer screen, click Next.
6. On the Welcome screen, read the overview and navigation instructions and click
Next.
7. On the License Agreement screen, read the license agreement. Accept the terms,
and Click Next.
8. On the Installation Folder screen, specify the installation folder and click Next.
9. On the Choose Web-Tier Package File screen, do the following:
a. Select the Web-Tier Package for the instance to which this web-tier server is
associated.
b. Type the Password.
c. Click Next.
10. On the Install User screen, enter the local user name and click Next.
11. On the Summary screen, do one of the following:
•
If the summary is correct, click Next.
•
If the summary is incorrect, click Previous, and correct the information.
12. On the Installation Progress screen, wait for the progress bar to indicate that the
installation is complete and click Next.
13. On the Run Configuration screen, wait for the configuration to complete and
click Next.
14. On the Installation Summary screen, click Done.
Next Steps
After you exit the web-tier installer, the Web-Tier Update Service connects to the
primary server to install the necessary services. Use the Operations Console to check
the status of this process.
In the Operations Console, click > Deployment Configurations > Web-Tier
Deployments > Manage Existing to view the web tier installation status.
5: Installing Web Tiers
69
RSA Authentication Manager 8.1 Setup and Configuration Guide
Install a Web Tier on Linux Using the Command Line
During installation, you run the RSA Authentication Web-Tier Installer on the
web-tier server. This installs dynamic seed provisioning, the Self-Service Console and
risk-based authentication (RBA) service.
•
Use only numbers and English characters when specifying paths and filenames.
Single-byte and double-byte characters are not supported.
•
The install user must have execute permission for the folder into which the web
tier is installed.
•
Do not save the web-tier installer and the web-tier package under the /root
directory.
•
Do not use spaces in the installation path.
Before You Begin
•
Verify that the open files hard limit for the local user is at least 4096.
•
Complete the Web-Tier Installation Checklist on page 65.
•
Copy the Webtier folder from the RSA Authentication Manager 8.1 Extras
download kit to the /tmp directory on the appliance. You can exclude the
windows-x86_64 folder.
Procedure
1. Log on as root.
2. On the command line, change directories to the location where you copied the
Webtier folder from the RSA Authentication Manager 8.1 Extras download kit.
Type the following and press ENTER:
/tmp/Webtier/linux-x86_64
3. Specify read, write, and execute access for the installation files. On the command
line, do the following:
•
For the install_webtier.sh file, type the following, and press ENTER:
chmod 700 ./install_webtier.sh
•
For the /tmp/Webtier/linux-x86_64/jdk/bin directory, type the following,
and press ENTER:
chmod 700 ./*
4. On the command line, type the following and press ENTER.
./install_webtier.sh -console
5. On the Welcome screen, type 1 to continue and press ENTER.
6. On the License Agreement screen, press ENTER to continue.
70
5: Installing Web Tiers
RSA Authentication Manager 8.1 Setup and Configuration Guide
7. On each successive License Agreement screen, you can do the following:
•
Press ENTER to continue to the next page of the License Agreement.
On the last screen, type YES and press ENTER to accept the terms of the
license agreement.
•
Type Q to quit the License Agreement.
Type YES and press ENTER to accept the terms of the license agreement.
8. On the Installation Folder screen, do the following:
a. Enter the location of the installation folder.
b. Press ENTER.
9. On the Choose Web Tier screen, do the following:
a. Enter the web-tier package location and file name, and press ENTER.
b. Enter the web-tier package password, and press ENTER.
c. Press ENTER.
10. On the Installation User screen, do the following:
a. Enter the installation user, and press ENTER.
b. Press ENTER.
11. On the Summary screen, review the summary and do one of the following:
a. If the summary is correct, type 1 to continue and press ENTER.
The installation begins and the Finish screen displays when the installation is
successful.
b. If the summary is incorrect, type 2 and press ENTER to quit.
The installation terminates and you must begin again.
12. On the Finish screen, press ENTER to exit.
Next Steps
After you exit the web tier installer, the Web-Tier Update Service connects to the
primary server to install the necessary services. Use the Operations Console to check
the status of this process.
In the Operations Console, click > Deployment Configurations > Web-Tier
Deployments > Manage Existing to view the web tier installation status.
5: Installing Web Tiers
71
RSA Authentication Manager 8.1 Setup and Configuration Guide
6
Next Steps for Your Deployment
After deploying RSA Authentication Manager, you must perform the required
configuration tasks. You can perform additional configuration tasks based upon your
deployment.
Topic
Description
For More Information
Required Steps for All Deployments
Port Usage
Confirm that the ports on the primary and replica
instances and the primary and replica web-tier servers
are accessible to enable authentication, administration,
replication, and other services on the network.
RSA Authentication Each user must have an account in RSA Authentication
Manager. You can create and store user accounts in the
Manager User
Accounts
internal database, or you can link Authentication
Manager directly to one or more external Lightweight
Directory Access Protocol (LDAP) directories.
For more information, see
Appendix C, Port Usage.
For more information on
using the internal database,
see the chapter
“Administering Users” in the
Administrator’s Guide.
For more information on
using your existing LDAP
directories, see the chapter
“Integrating LDAP
Directories” in the
Administrator’s Guide.
Authentication
Agents
An authentication agent is the component on the
protected resource that communicates with RSA
Authentication Manager to process authentication
requests. Any resource that is used with SecurID
authentication, on-demand authentication (ODA) or
risk-based authentication (RBA) requires an
authentication agent.
6: Next Steps for Your Deployment
For a list of RSA
authentication agents, go to
http://www.emc.com/securit
y/rsa-securid/rsa-securid-au
thentication-agents.htm#!of
ferings.
For a list of third-party
products that have embedded
RSA agents, go to the
RSA Secured® web site at
https://gallery.emc.com/com
munity/marketplace/rsa?vie
w=overview.
73
RSA Authentication Manager 8.1 Setup and Configuration Guide
Topic
Description
For More Information
RSA RADIUS Configuration
RSA RADIUS
Configuration
In a RADIUS-protected network, RADIUS clients
control user access at the network perimeter.
RADIUS clients, which can be VPN servers, wireless
access points, or Network Access Servers connected to
dial-in modems, interact with RSA RADIUS servers for
user authentication and to establish appropriate access
control parameters.
For more information, see the
chapter “Administering RSA
RADIUS” in the
Administrator’s Guide.
When authentication succeeds, RADIUS servers return a
set of attributes to RADIUS clients for session control.
Authentication Method Configuration
Hardware and
Software Tokens
For more information, see the
chapter “Deploying and
Device manufactured by RSA that generates and
Administering RSA SecurID
displays tokencodes. A tokencode is always displayed
and changes automatically at intervals, such as every 60 Tokens” in the
Administrator’s Guide.
seconds. The tokencode must be combined with the
user’s PIN to create a passcode, which enables
authentication. Hardware tokens include PINPads, key
fobs, and USB tokens.
Hardware Token
Software Token
Software-based security token installed with an
associated RSA SecurID application to a Windows
desktop or laptop, web browser, an RSA Smart Card, a
personal digital assistant (PDA), or a mobile device.
In most cases, software tokens are configured to request
a user’s PIN. The software token combines the PIN with
the tokencode, and then displays the passcode, which
enables authentication.
Risk-Based
Authentication
(RBA)
RBA identifies potentially risky or fraudulent
authentication attempts by silently analyzing user
behavior and the device of origin. RBA strengthens RSA
SecurID authentication.
For more information, see the
chapter “Deploying
Risk-Based Authentication”
in the Administrator’s Guide.
On-Demand
Authentication
(ODA)
ODA delivers a one-time tokencode to a user by e-mail
or text message. You must configure the on-demand
tokencode delivery method. Install the authentication
agent software on the resource that you want to protect,
unless the agent is already embedded in the protected
resource.
For more information, see
the chapter “Deploying
On-Demand Authentication”
in the Administrator’s Guide.
74
6: Next Steps for Your Deployment
RSA Authentication Manager 8.1 Setup and Configuration Guide
Topic
Description
For More Information
Additional Deployment Steps
Self-service
configuration
You can configure RSA Authentication Manager to
enable users to perform maintenance and
troubleshooting tasks through the Self-Service Console.
For more information, see the
chapter “RSA Self-Service”
in the Administrator’s Guide.
Securing Your
Deployment
You may need to perform additional network and
product configuration for secure operation, depending
on your network topology and on the RSA
Authentication Manager features that you intend to use.
For more information, see the
Security Configuration
Guide.
In addition, each RSA Authentication Manager instance
includes Clam Antivirus (ClamAV) software. ClamAV is
an open-source software toolkit that is intended to
reduce the risk of intrusion or malicious system or data
access.
6: Next Steps for Your Deployment
75
RSA Authentication Manager 8.1 Setup and Configuration Guide
A
Applying RSA Authentication Manager 8.1
SP1
On a hardware appliance or a VMware virtual appliance, you can apply SP1 to RSA
Authentication Manager 8.1 with or without patches.
Note: RSA Authentication Manager 8.1 SP1 software is pre-installed on the Hyper-V
virtual appliance.
RSA Authentication Manager 8.1 SP1 includes the software fixes in the cumulative
Patch 5 for version 8.1. A future patch for version 8.1 SP1 will include:
•
Software fixes from the version 8.1 Patch 6
•
Software fixes from any other 8.1 patches released before version 8.1 SP1
Applying SP1 removes any software fixes that are not included in the cumulative
Patch 5 for version 8.1. You must apply a future version 8.1 SP1 patch to obtain these
fixes.
To apply SP1, perform these tasks in order:
1. Review the prerequisites. See Before Installing SP1.
2. Follow the standard steps to apply an 8.1 update. See Installing SP1.
3. If your deployment includes a web tier, you must update it using the Operations
Console. See Update the Web Tier.
Before Installing SP1
Before installing this upgrade, review the following guidelines and requirements.
Backup or VMware Snapshot Strongly Recommended
RSA Authentication Manager 8.1 Service Pack 1 is not reversible. If the service pack
is not applied successfully, you must restore from a backup file or a VMware
snapshot. Trying to apply the service pack again is not recommended.
Note: RSA strongly recommends backing up your deployment or taking a VMware
snapshot before applying Service Pack 1.
If you deployed a hardware appliance or a VMware virtual appliance, you can back up
the version 8.1 database. Use the Back Up Now feature in the Operations Console of
the primary instance. See the Operations Console Help topic “Create a Backup using
Back Up Now.”
You can restore version 8.1 if you backed up your deployment before applying Service
Pack 1. See the Operations Console Help topic “Restore from Backup.”
A: Applying RSA Authentication Manager 8.1 SP1
77
RSA Authentication Manager 8.1 Setup and Configuration Guide
If you deployed a VMware virtual appliance, you can take a snapshot of each virtual
machine in the version 8.1 deployment.
When you take a snapshot of an Authentication Manager instance, you must specify
the following settings:
•
Do not save the virtual machine’s memory.
•
Choose to quiesce (disable) the guest file system. This option pauses running
processes on the Authentication Manager instance.
For additional instructions, see the VMware vSphere Client documentation.
You can restore version 8.1 if you took a VMware snapshot before applying Service
Pack 1. Export your data or take other steps to preserve your data before reverting to a
snapshot. See the Administrator’s Guide for information about restoring snapshots.
Replicated Deployments
If you have a replicated deployment, all replica instances must be running and
replicating successfully when you apply SP1 to the primary or replica instances. All
instances must be able to communicate while the upgrade is applied. To verify the
replication status, log on to the primary instance Operations Console, and then click
Deployment Configuration > Instances > Status Report.
Apply SP1 to the primary instance before upgrading the replica instances in your RSA
Authentication Manager 8.1 deployment. On the primary instance, wait for the
replication status to return to normal for all replica instances before upgrading the
replica instances.
Additional Requirements
SP1 has the following additional requirements:
78
•
Each virtual appliance must have at least 4 GB of free disk space to apply SP1.
•
The following credentials are required for the upgrade:
–
Operating system password for the rsaadmin user account on each virtual
appliance.
–
An Operations Console administrator account, with access to the Operations
Console, for the primary instance and each replica instance.
A: Applying RSA Authentication Manager 8.1 SP1
RSA Authentication Manager 8.1 Setup and Configuration Guide
Installing SP1
The RSA Authentication Manager 8.1 SP 1 ZIP file (am-update-8.1.1.0.0.zip)
contains the following files:
•
am-update-8.1.1.0.0.iso. The RSA Authentication Manager 8.1 SP1 ISO file that
is used to apply the service pack to Authentication Manager.
•
RSA Authentication Manager 7.1 Migration Export Utility. The folder that
contains the necessary files for installing the updated Migration Export Utility on
version 7.1. If you plan to perform a migration from version 7.1, or are testing the
version 7.1 migration process, use this version of the utility with SP1. For more
information, see one the following documents, as appropriate for your
configuration:
–
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA
SecurID Appliance 3.0 on Existing Hardware
–
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Migrating to a New
Hardware Appliance or Virtual Appliance
You can apply an update through your web browser, or you can store the service pack
in an NFS share, a shared folder on Windows, a DVD/CD, or an ISO image on your
local machine.
The overall steps to install this service pack are as follows:
•
Specify a Product Update Location
•
Scan for Updates
•
Apply the Product Update
Specify a Product Update Location
To specify a product update location, or to edit a previously specified location,
perform the following procedure to allow RSA Authentication Manager 8.1 to locate
Service Pack 1.
If you have already specified a location, see Scan for Updates on page 80.
Before You Begin
•
Download the service pack from RSA SecurCare Online to a location that the
primary or replica instance can access.
•
If you intend to scan for updates on an RSA-supplied DVD or CD, do the
following:
–
On a hardware appliance, use the DVD/CD drive or mount an ISO image.
–
On a virtual appliance, you must configure the virtual appliance to mount a
DVD/CD or an ISO image. See the Operations Console Help topic “VMWare
DVD/CD or ISO Image Mounting Guidelines.”
A: Applying RSA Authentication Manager 8.1 SP1
79
RSA Authentication Manager 8.1 Setup and Configuration Guide
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. On the Update & Rollback page, your local browser is configured as the method
for applying an update. To change that setting, click Configure Update Source.
3. On the Configure Update Sources page, specify a location for updates.
•
To upload the update from your local machine, select Use your web browser
to upload an update.
•
To scan for updates on an NFS share, select Use NFS as the update source.
Enter the full path, including the IP address or hostname where updates are
stored. For example: 192.168.1.2:/updates
•
To scan for updates on a Windows shared folder, select Use Windows Share
as the update source.
•
–
In the Windows Share Path field, enter the full path, including the IP
address or hostname where updates are stored. For example:
\\192.168.1.2\updates
–
(Optional) In the Windows Username field, enter a username. If your
Windows share configuration requires it, enter the domain and username.
–
(Optional) In the Windows Password field, enter a password only if it is
required by your Windows share configuration.
To scan for updates on a DVD or CD, select Use DVD/CD as the update
source.
4. To test the NFS or Windows share directory settings, click Test Connection. A
message indicates whether the configured shared directory is available to the
primary or replica instance.
5. Click Save.
Next Steps
Do one of the following:
•
If you configured your local web browser as the method to apply an update, see
Apply the Product Update on page 81.
•
If you configured an NFS share, a Windows shared directory, or a DVD/CD as an
update location, see Scan for Updates on page 80.
Scan for Updates
If you configured an NFS share, a Windows shared directory, or a DVD/CD as an
update location, you can scan to locate and review a list of available product updates.
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. Click Scan for Updates. You can view the progress of the scan on the Basic
Status View tab. You can view more detailed information on the Advanced
Status View tab.
80
A: Applying RSA Authentication Manager 8.1 SP1
RSA Authentication Manager 8.1 Setup and Configuration Guide
3. Click Done to return to the Update & Rollback page.
The Available Updates section displays a list of updates, with the following
information for each update:
•
Version. The version of the update. To see the current Authentication
Manager version, see the top of the Update and Rollback page.
•
Reversible. Indicates whether you can roll back (undo) the update. Service
pack 1 is not reversible.
•
Automatic Appliance Reboot. Indicates whether Authentication Manager
automatically restarts the Appliance to apply the update. If the Appliance
restarts, you must perform another scan to see a current list of updates.
•
Automatic Operations Console Reboot. Indicates whether Authentication
Manager automatically restarts the Operations Console to apply the update. If
the Operations Console restarts, you must perform another scan to see a
current list of updates.
•
Action. States whether the update is available to apply. Lists the minimum
system requirement for the update.
4. In the Applied Updates section, click Download Detailed History Log for a
complete update history.
The Applied Updates section displays the updates applied to the instance. This
section includes the update version numbers, the time and date that each update
was applied, and which administrator applied the update.
After you scan for updates, the new list displays for 24 hours. Logging out of the
Operations Console does not remove the list from the system cache. If you restart
the Operations Console, download additional updates, or change the product
update locations, you must perform another scan to see the most current list.
Next Step
Apply Service Pack 1 to the RSA Authentication Manager deployment. See Apply the
Product Update on page 81.
Apply the Product Update
Apply the product update to the primary instance first, and then to each replica
instance. As each replica instance is updated, all of the accumulated data on each
replica instance is sent to the primary instance.
Before You Begin
•
Specify a Product Update Location
•
If you have configured an NFS share, a Windows shared directory, or a DVD/CD
as an update location, Scan for Updates.
•
In a replicated deployment, after upgrading the primary instance, wait for the
replication status to return to normal for all replica instances before upgrading the
replica instances. To verify the replication status, log on to the primary instance
Operations Console, and click Deployment Configuration > Instances > Status
Report.
A: Applying RSA Authentication Manager 8.1 SP1
81
RSA Authentication Manager 8.1 Setup and Configuration Guide
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. RSA recommends applying the most recent update. Do one of the following,
depending on your configuration:
•
To apply an update through your local web browser, do the following:
a. Click Upload & Apply Update.
b. Click Browse to navigate to the location of the update. You cannot type
the update location in the Update Path field.
c. Click Upload.
d. Verify the update details, and click Apply.
•
If you have configured an NFS share, a Windows shared directory, or a
DVD/CD as an update location, do the following:
a. Click Scan for Updates. Available Updates displays all of the updates
that can be applied.
b. Next to the update to apply, click Apply Update.
c. Click Confirm to apply the update.
3. In the Password field, enter the password for the operating system user
rsaadmin, and click Log On.
4. The basic status messages appear while the update is applied. You can view more
detailed information on the Advanced Status View tab.
After the service pack is applied, the following occurs:
•
The appliance automatically restarts. When the restart is complete, click Done.
•
Authentication Manager moves the update from the Available Updates section to
the Applied Updates section.
•
When you return to the Update & Rollback page, the update is listed in the
Applied Updates section. To save the high-level update history, click Download
Detailed History Log.
•
The software version information is updated with the service pack number. To
view the software version information, log on to the Security Console, and click
Software Version Information.
Next Steps
•
82
You can download a detailed log file containing the information that was
displayed on the Advanced Status View tab. The file is named
update-version-timestamp.log, where version is the update version number and
timestamp is the time that the update completed. For instructions, see the
Operations Console Help topic “Download Troubleshooting Files.”
A: Applying RSA Authentication Manager 8.1 SP1
RSA Authentication Manager 8.1 Setup and Configuration Guide
•
•
After you have upgraded the primary instance and all of the replica instances, do
the following:
–
Verify that replication and radius replication is functioning correctly on the
primary instance and the replica instance.
–
SP1 includes the software fixes in the cumulative Patch 5 for version 8.1. As
needed, obtain later software fixes by applying the latest version 8.1
cumulative patches to the upgraded Authentication Manager instances.
If the deployment includes a web tier, see Update the Web Tier.
Update the Web Tier
You must update the web tier when you make any changes such as updating your
version of Authentication Manager and customizing the web-tier pages.
Authentication Manager displays an update button in the Operations Console for each
web tier that is not up-to-date. If you have multiple web tiers to update, update one
web tier at a time. Each update can take up to 20 minutes to complete.
Procedure
1. In the Operations Console, click Deployment Configuration > Web-Tier
Deployments > Manage Existing.
2. On the Web Tiers page, in the Status column, click Update for the web tier that
you want to update.
When the update is complete, the Status column for the updated web tier displays
Online.
A: Applying RSA Authentication Manager 8.1 SP1
83
RSA Authentication Manager 8.1 Setup and Configuration Guide
B
Upgrading RSA Authentication Manager 8.0
to 8.1
The RSA Authentication Manager 8.0 to 8.1 upgrade patch installs RSA
Authentication Manager 8.1.
To install this upgrade, follow these procedures in order:
•
Review the prerequisites. See Before Installing This Upgrade.
•
Follow the standard steps to apply version 8.0 or 8.1 patches:
–
Specify an Upgrade Patch Location
–
Scan for Updates
–
Apply the Upgrade Patch
•
Review the next steps that are specific to the upgrade.See After Installing this
Upgrade on the Primary and Replica Instances.
•
If your deployment includes a web tier, you must reinstall it. See Reinstall the
Web Tier.
Before Installing This Upgrade
Before installing this upgrade, review the following guidelines and requirements.
VMware Snapshot Strongly Recommended
The RSA Authentication Manager 8.0 to 8.1 upgrade patch is not reversible.
Note: RSA strongly recommends taking a VMware snapshot of each virtual machine
before upgrading.
When you take a snapshot of an Authentication Manager instance, you must specify
the following settings:
•
Do not save the virtual machine’s memory.
•
Choose the option to quiesce the guest file system in order to pause running
processes on the Authentication Manager instance.
For additional instructions, see the VMware vSphere Client documentation.
You can restore version 8.0 if you took a VMware snapshot before upgrading. Export
your data or take other steps to preserve your data before reverting to a snapshot. See
the Administrator’s Guide for information about restoring snapshots.
B: Upgrading RSA Authentication Manager 8.0 to 8.1
85
RSA Authentication Manager 8.1 Setup and Configuration Guide
Required Credentials
The following credentials are required:
•
The upgrade requires the operating system password for the rsaadmin user
account on each virtual appliance.
•
To apply the upgrade, you must have an Operations Console administrator
account, with access to the Operations Console, for the primary instance and each
replica instance.
•
To reinstall the web tier, you must be a Super Admin.
Replicated Deployments
If you have a replicated deployment, all replica instances must be running and
replicating successfully when you apply the upgrade to the primary or replica
instances. All instances must be able to communicate while the upgrade is applied. To
verify the replication status, log on to the primary instance Operations Console, and
then click Deployment Configuration > Instances > Status Report.
Apply this upgrade patch to the primary instance before upgrading the replica
instances in your RSA Authentication Manager 8.0 deployment. On the primary
instance, wait for the replication status to return to normal for all replica instances
before upgrading the replica instances.
During the upgrade process, the upgraded version 8.1 primary instance and the
existing version 8.0 replica instances can successful replicate. Be aware that you
cannot attach a new version 8.0 replica instance to a version 8.1 primary instance.
Required Disk Space
Each virtual appliance must have free disk space that is equal to the size of the current
Authentication Manager database, plus 4 GB. For example, if the current database is 1
GB, then you need 5 GB of free disk space.
To determine the size of the current Authentication Manager database, log on to the
appliance operating system using SSH or the VMware vSphere Client, and then run
this command:
du -h -d 0 /opt/rsa/am/rsapgdata
The command displays output that is similar to the following example:
64M
/opt/rsa/am/rsapgdata
Migrating From Version 7.1
Migrating from RSA Authentication Manager 7.1 to an upgraded version 8.1
deployment is not supported. If you attempt to do this, migration fails, and the
RADIUS dictionary files are deleted.
86
B: Upgrading RSA Authentication Manager 8.0 to 8.1
RSA Authentication Manager 8.1 Setup and Configuration Guide
After upgrading from version 8.0 to version 8.1, you cannot do a full migration. You
can only choose to import data from version 7.1 while retaining the existing system
settings and deployment topology. Migrate from version 7.1 before applying the
version 8.0 to 8.1 upgrade patch, or migrate from version 7.1 to a new version 8.1
deployment. To recover the RADIUS dictionary files, see the Knowledgebase article
a63914 at
https://knowledge.rsasecurity.com/scolcms/knowledge.aspx?solution=a63914.
Patches for Version 8.0 and 8.1
RSA Authentication Manager 8.0 without patches or with any patch can be upgraded
to version 8.1. The 8.0 to 8.1 upgrade kit installs the base version of 8.1, which
includes the software fixes in the cumulative Patch 4 for version 8.0.
If you have applied Patch 5, 6, 7, or 8 to version 8.0, then you should apply RSA
Authentication Manager 8.1 SP1 after upgrading. Version 8.1 SP1 includes the
software fixes in the version 8.0 Patches 5 through 8.
After upgrading to version 8.1 SP1, you can obtain the fixes included in later 8.0
patches by applying the latest version 8.1 cumulative patch.
Specify an Upgrade Patch Location
To specify a product update location, or to edit a previously specified location,
perform the following procedure to allow RSA Authentication Manager 8.0 to locate
patches.
If you have already specified a location, see Scan for Updates on page 88.
Before You Begin
Download the patch from RSA SecurCare Online to a location that the primary or
replica instance can access.
To scan for updates on a DVD or CD, you must configure the virtual appliance to
mount a DVD/CD or an ISO image. See the Operations Console Help topic “VMWare
DVD/CD or ISO Image Mounting Guidelines.”
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. On the Update & Rollback page, your local browser is configured as the method
for applying an update. To change that setting, click Configure Update Source.
3. On the Configure Update Sources page, specify a location for updates.
•
To upload the update from your local machine, select Use your web browser
to upload an update.
•
To scan for updates on an NFS share, select Use NFS as the update source.
Enter the full path, including the IP address or hostname where updates are
stored. For example: 192.168.1.2:/updates
B: Upgrading RSA Authentication Manager 8.0 to 8.1
87
RSA Authentication Manager 8.1 Setup and Configuration Guide
•
•
To scan for updates on a Windows shared folder, select Use Windows Share
as the update source.
–
In the Windows Share Path field, enter the full path, including the IP
address or hostname where updates are stored. For example:
\\192.168.1.2\updates
–
(Optional) In the Windows Username field, enter a username. If your
Windows share configuration requires it, enter the domain and username.
–
(Optional) In the Windows Password field, enter a password only if it is
required by your Windows share configuration.
To scan for updates on a DVD or CD, select Use DVD/CD as the update
source.
4. To test the NFS or Windows share directory settings, click Test Connection. A
message indicates whether the configured shared directory is available to the
primary or replica instance.
5. Click Save.
Next Steps
Do one of the following:
•
If you configured your local web browser as the method to apply an update, see
Apply the Upgrade Patch on page 89.
•
If you configured an NFS share, a Windows shared directory, or a DVD/CD as an
update location, see Scan for Updates on page 88.
Scan for Updates
If you configured an NFS share, a Windows shared directory, or a DVD/CD as an
update location, you can scan to locate and review a list of available product updates.
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. Click Scan for Updates. You can view the progress of the scan on the Basic
Status View tab. You can view more detailed information on the Advanced
Status View tab.
3. Click Done to return to the Update & Rollback page.
The Available Updates section displays a list of updates, with the following
information for each update:
88
•
Version. The version of the update. To see the current Authentication
Manager version, see the top of the Update and Rollback page.
•
Reversible. Indicates whether you can roll back (undo) the update. The
upgrade patch is not reversible.
B: Upgrading RSA Authentication Manager 8.0 to 8.1
RSA Authentication Manager 8.1 Setup and Configuration Guide
•
Automatic Appliance Reboot. Indicates whether Authentication Manager
automatically restarts the Appliance to apply the update. If the Appliance
restarts, you must perform another scan to see a current list of updates.
•
Automatic Operations Console Reboot. Indicates whether Authentication
Manager automatically restarts the Operations Console to apply the update. If
the Operations Console restarts, you must perform another scan to see a
current list of updates.
•
Action. States whether the update is available to apply. Lists the minimum
system requirement for the update.
4. In the Applied Updates section, click Download Detailed History Log for a
complete update history.
The Applied Updates section displays the updates applied to the instance. This
section includes the update version numbers, the time and date that each update
was applied, and which administrator applied the update.
After you scan for updates, the new list displays for 24 hours. Logging out of the
Operations Console does not remove the list from the system cache. If you restart
the Operations Console, download additional updates, or change the product
update locations, you must perform another scan to see the most current list.
Next Step
Apply the upgrade patch to the RSA Authentication Manager deployment.
Apply the Upgrade Patch
Apply the upgrade patch to the primary instance first, and then to each replica
instance. As each replica instance is updated, all of the accumulated data on each
replica instance is sent to the primary instance.
Before You Begin
•
Specify an Upgrade Patch Location
•
If you have configured an NFS share, a Windows shared directory, or a DVD/CD
as an update location, Scan for Updates.
•
In a replicated deployment, after upgrading the primary instance, wait for the
replication status to return to normal for all replica instances before upgrading the
replica instances. To verify the replication status, log on to the primary instance
Operations Console, and click Deployment Configuration > Instances > Status
Report.
Procedure
1. In the Operations Console, click Maintenance > Update & Rollback.
2. RSA recommends applying the most recent update. Do one of the following,
depending on your configuration:
•
To apply an update through your local web browser, do the following:
a. Click Upload & Apply Update.
B: Upgrading RSA Authentication Manager 8.0 to 8.1
89
RSA Authentication Manager 8.1 Setup and Configuration Guide
b. Click Browse to navigate to the location of the update. You cannot type
the update location in the Update Path field.
c. Click Upload.
d. Verify the update details, and click Apply.
•
If you have configured an NFS share, a Windows shared directory, or a
DVD/CD as an update location, do the following:
a. Click Scan for Updates. Available Updates displays all of the updates
that can be applied.
b. Next to the update to apply, click Apply Update.
c. Click Confirm to apply the update.
3. In the Password field, enter the password for the operating system user
rsaadmin, and click Log On.
4. The basic status messages appear while the update is applied. You can view more
detailed information on the Advanced Status View tab.
After the patch is applied, the following occurs:
•
Authentication Manager moves the update from the Available Updates section to
the Applied Updates section.
•
The Operations Console or Appliance automatically restarts. When the restart is
complete, click Done.
•
When you return to the Update & Rollback page, the update is listed in the
Applied Updates section. To save the high-level update history, click Download
Detailed History Log.
•
The software version information is updated with the patch number. To view the
software version information, log on to the Security Console, and click Software
Version Information.
Next Steps
90
•
You can download a detailed log file containing the information that was
displayed on the Advanced Status View tab. The file is named
update-version-timestamp.log, where version is the update version number and
timestamp is the time that the update completed. For instructions, see the
Operations Console Help topic “Download Troubleshooting Files.”
•
Follow the steps in After Installing this Upgrade on the Primary and Replica
Instances on page 91.
•
If the deployment includes a web tier, see Reinstall the Web Tier on page 91.
B: Upgrading RSA Authentication Manager 8.0 to 8.1
RSA Authentication Manager 8.1 Setup and Configuration Guide
After Installing this Upgrade on the Primary and Replica Instances
After you have upgraded the primary instance and all of the replica instances, do the
following:
•
Verify that replication and radius replication is functioning correctly on the
primary instance and the replica instance.
•
The upgrade installs the base version of RSA Authentication Manager 8.1, which
includes the fixes in the cumulative Patch 4 for version 8.0. As needed, obtain
later software fixes by applying the latest version 8.1 patches to the upgraded
Authentication Manager instances. For example, RSA Authentication Manager
8.1 P01 will include the fixes in RSA Authentication Manager 8.0 P5, P6, and P7.
•
If you upgraded an RSA Authentication Manager 8.0 deployment that did not
have any patches applied, then you should perform an additional step. RSA
Authentication Manager 8.0 Patch 1 or later, and RSA Authentication Manager
8.1 at any patch level, prevent the syslog from logging the operating system
password and the Simple Network Management Protocol (SNMP) passwords. To
further secure these passwords, do the following:
–
Change the operating system account password and the passwords that are
associated with your SNMP configuration. For instructions, see the
Operations Console Help topics “Change the Operating System Account
Password” and “Configure SNMP.”
–
Remove the operating system account password and the SNMP passwords
from existing log entries. For instructions, see the knowledgebase article with
the Solution ID a61380 on RSA SecurCare Online.
Reinstall the Web Tier
If your deployment includes a web tier, after upgrading the primary and replica
instances, you must upgrade the web tier. Follow these procedures to retain all existing
web-tier configuration and customization settings:
1. Uninstall the Web Tier
2. Generate a New Web-Tier Deployment Package
3. Run the Web-Tier Installer for Your Platform
4. Update the Web Tier
Uninstall the Web Tier
Uninstalling a web tier removes the web tier and all features and components of
RSA Authentication Manager from the web-tier server. Uninstalling a web tier does
not delete the web-tier deployment record.
For instructions, see the following:
Uninstall a Web Tier on Linux
Uninstall a Web Tier on Windows
B: Upgrading RSA Authentication Manager 8.0 to 8.1
91
RSA Authentication Manager 8.1 Setup and Configuration Guide
Uninstall a Web Tier on Linux
During uninstallation, run the RSA Authentication Web-Tier Uninstaller for Linux on
the web-tier server.
Before You Begin
•
Confirm that you have root privileges.
•
Verify that the open files hard limit for the local user is at least 4096.
Procedure
1. Log on to the web-tier server.
2. Change directories to
your-authentication-manager-web-tier-installation/uninstall.
3. On the command line, type:
./uninstall.sh
4. Press ENTER.
5. On the Welcome screen, type:
yes
6. Press ENTER.
The system uninstalls the web tier and displays “Uninstall Complete” when
finished.
Uninstall a Web Tier on Windows
During uninstallation, run the RSA Authentication Web-Tier Uninstaller for Windows
on the web-tier server.
Before You Begin
Confirm that you have Windows credentials to uninstall a program.
Procedure
1. On the web-tier server, go to Start > Control Panel > Programs and Features >
Uninstall a Program.
2. Right-click RSA Authentication Web Tier, and select Uninstall.
3. On the command line, type:
y
and press ENTER.
When finished, the uninstaller screen displays Uninstall finished.
4. Press ENTER.
The system removes the web-tier services and installation folders, except the
top-level folder.
92
B: Upgrading RSA Authentication Manager 8.0 to 8.1
RSA Authentication Manager 8.1 Setup and Configuration Guide
Generate a New Web-Tier Deployment Package
On the primary instance, generate a new web-tier deployment package. The web-tier
deployment package contains the information that Authentication Manager uses to
connect the web tier to the preferred server.
Before You Begin
•
You must be a Super Admin.
Procedure
1. In the Operations Console, click Deployment Configuration > Web-Tier
Deployments > Manage Existing.
2. If prompted, enter your Super Admin User ID and password.
3. From the list of web-tier deployment records, click a web-tier deployment record
to generate the package.
4. From the context menu, click Generate Package.
5. On the Generate Web-Tier Deployment Package page, verify the following
information:
•
Hostname of the web-tier server
•
Preferred server hostname
6. Enter a web-tier package password.
7. Click Generate Package, and wait for the package to generate.
8. In the Download Web-Tier Deployment Package section, click Download
Package.
Run the Web-Tier Installer for Your Platform
Obtain the RSA Authentication Manager 8.1 Extras download kit from RSA
Download Central at https://download.rsasecurity.com. On the web-tier server, run
the RSA Authentication Web-Tier Installer for your platform. For instructions, see the
following:
•
Install a Web Tier on Windows Using the Graphical User Interface on page 66.
•
Install a Web Tier on Windows Using the Command Line on page 67.
•
Install a Web Tier on Linux Using the Graphical User Interface on page 68.
•
Install a Web Tier on Linux Using the Command Line on page 70.
B: Upgrading RSA Authentication Manager 8.0 to 8.1
93
RSA Authentication Manager 8.1 Setup and Configuration Guide
Update the Web Tier
You must update the web tier when you make any changes such as updating your
version of Authentication Manager and customizing the web-tier pages.
Authentication Manager displays an update button in the Operations Console for each
web tier that is not up-to-date. If you have multiple web tiers to update, update one
web tier at a time. Each update can take up to 20 minutes to complete.
Procedure
1. In the Operations Console, click Deployment Configuration > Web-Tier
Deployments > Manage Existing.
2. On the Web Tiers page, in the Status column, click Update for the web tier that
you want to update.
When the update is complete, the Status column for the updated web tier displays
Online.
94
B: Upgrading RSA Authentication Manager 8.0 to 8.1
RSA Authentication Manager 8.1 Setup and Configuration Guide
C
Port Usage
Port Traffic
The following figure represents a common RSA Authentication Manager deployment
with primary and replica instances, web tiers, and a load balancer. An external firewall
protects the primary and replica instances, and another external firewall protects the
DMZ. For more information on RADIUS ports, see Ports for the RSA Authentication
Manager Instance on page 95.
Ports for the RSA Authentication Manager Instance
The RSA Authentication Manager instance has an internal firewall that limits traffic to
specific ports. The internal firewall restricts inbound traffic to the hosts and services
that provide product functionality. Outbound traffic is not restricted. RSA
recommends that you deploy the instance in a subnet that also has an external firewall
to segregate it from the rest of the network.
C: Port Usage
95
RSA Authentication Manager 8.1 Setup and Configuration Guide
The following table lists ports used by the Authentication Manager instance. All ports
support IPv4 only, unless IPv6 support is specified in the description.
Port Number
Function
and Protocol
Source
Description
22, TCP
SSH
SSH client
Disabled by default. Allows the
operating system account (rsaadmin)
to access the operating system.
49, TCP
TACACS
authentication
TACACS client
Used to receive authentication
requests from Network Access
Device (NAD).
80, TCP
Quick Setup
Administrator’s
browser
Used for Quick Setup. After Quick
Setup is complete, the appliance
redirects connections from this port
to the appropriate console.
SNMP client
Used by the Authentication Manager
SNMP agent to listen for GET
requests and send responses to a
Network Management System
(NMS).
Operations
Console,
Security Console
161, UDP
SNMP
This port is closed, unless SNMP is
enabled. It can be configured in the
Security Console.
443, TCP
Quick Setup
Operations
Console,
Security
Console,
Self-Service
Console
96
Administrator’s
browser
Used for Quick Setup. After Quick
Setup is complete, the appliance
redirects connections from this port
to the appropriate console.
1645, UDP
RADIUS
authentication
(legacy port)
RADIUS client
This port receives authentication
requests from a RADIUS client.
1646, UDP
RADIUS
accounting
(legacy port)
RADIUS client
This port receives inbound
accounting requests from a RADIUS
client.
C: Port Usage
RSA Authentication Manager 8.1 Setup and Configuration Guide
Port Number
Function
and Protocol
1812, TCP
RADIUS
replication port
Source
Description
Another
RADIUS server
This port is used for communication
between primary RADIUS and
replica RADIUS services.
If you do not use RSA RADIUS, but
you have replica instances, you must
keep this port open. For more
information, see Required RSA
RADIUS Server Listening Ports on
page 99.
1812, UDP
RADIUS
authentication
RADIUS client
This port receives authentication
requests from a RADIUS client.
If you do not plan to use RSA
RADIUS authentication, you can
close this port.
1813, TCP
RADIUS
administration
RADIUS server
This port is used to administer
RADIUS from the Security Console
over the protected RADIUS remote
administration channel.
If you do not use RSA RADIUS, but
you have replica instances, you must
keep this port open. For information,
see Required RSA RADIUS Server
Listening Ports on page 99.
1813, UDP
RADIUS
accounting
RADIUS client
This port receives accounting
requests from a RADIUS client.
If you do not plan to use RSA
RADIUS authentication, you can
close this port.
C: Port Usage
5500, TCP
Agent
authentication
RSA SecurID
Authentication
protocol agents
Accepts requests from TCP-based
authentication agents and sends
replies. Required for RSA SecurID
and on-demand authentication
(ODA). This port supports both
IPv4- and IPv6-compliant agents.
5500, UDP
Agent
authentication
RSA SecurID
Authentication
protocol agents
Accepts requests from UDP-based
authentication agents and sends
replies. Required for RSA SecurID,
ODA and risk-based authentication
(RBA). This port only supports
IPv4-compliant agents.
97
RSA Authentication Manager 8.1 Setup and Configuration Guide
Port Number
Function
and Protocol
Source
Description
5550, TCP
Agent
auto-registration
RSA agents
Used for communication with
authentication agents that are
attempting to register with
Authentication Manager.
5580, TCP
Offline
authentication
service
RSA agents
Used to receive requests for
additional offline authentication
data, and send the offline data to
agents. Also used to update server
lists on agents.
This can be closed if offline
authentications are not in use and no
agents in your deployment use the
Login Password Integration API.
7002, TCP
Authentication
SSL-encrypted Manager
Another
appliance
Used for communication between an
Authentication Manager primary and
replica instances and for
communication between replica
instances (for replay detection).
Used by the RSA application
programming interface (API).
Enable if you have at least one
replica instance.
7002, TCP
RSA Token
SSL-encrypted Management
snap-in for the
Microsoft
Management
Console (MMC)
Microsoft
Management
Console
7004, TCP
Security Console Administrator’s
browser
SSL-encrypted
Required for administering your
deployment from the Security
Console. Accepts requests for
Security Console functions.
7004, TCP
Self-Service
SSL-encrypted Console and
RBA
User’s browser
Required for using the elf-Service
Console or RBA. Accepts requests
for Self-Service Console functions
and RBA authentication.
7004, TCP
User’s browser
Required for using dynamic seed
provisioning.
Cryptographic
SSL-encrypted Token-Key
Initialization
Protocol
(CT-KIP)
98
Enable this port if you plan to use the
RSA Token Management snap-In to
manage users and authenticators
from MMC.
C: Port Usage
RSA Authentication Manager 8.1 Setup and Configuration Guide
Port Number
Function
and Protocol
Source
Description
7022, TCP
Trusted realm
SSL-encrypted network access
point or the web
tier.
Trusted realm, or Only enable this port if you have
the web tier and trusted realms or have a web tier.
another appliance Used to communicate with trusted
realms. Allows communication
between the appliance and its web
tier.
7072, TCP
Operations
SSL-encrypted Console
Super Admin’s
browser
7082, TCP
Authentication
Used for configuring RADIUS and
Manager instance restarting the RADIUS service from
the Operations Console.
RADIUS
SSL-encrypted Configuration
SSL
Required for administering your
deployment from the Operations
Console. Accepts requests for
Operations Console functions.
Restricting Access to the RSA Consoles
Access to the Security Console (port 7004) and the Operations Console (port 7072)
should be restricted to internal administrators only. While port 7004 is used by the
Security Console, dynamic seed provisioning, and the Self-Service Console, it should
not be directly accessible outside the intranet. To allow access to the Self-Service
Console or dynamic seed provisioning for external users, set up a web tier to help
protect port 7004 and restrict access to the Security Console.
Required RSA RADIUS Server Listening Ports
RSA RADIUS is installed and configured with RSA Authentication Manager. All the
RADIUS-related ports (1645, 1646, 1812, 1813, and 7082) on the Authentication
Manager server are open by default.
The RADIUS standard initially used UDP ports 1645 and 1646 for RADIUS
authentication and accounting packets. The RADIUS standards group later changed
the port assignments to 1812 and 1813. The Authentication Manager RADIUS server
listens on all four ports for backward compatibility. If all the RADIUS clients are
configured to talk to the RADIUS servers only on ports 1812 and 1813, you should
block legacy ports 1645 and 1646 on the external firewall.
If you do not plan to use RSA RADIUS, but you have replica instances in your
deployment, you must keep the TCP ports 1812 and 1813 open on your network.
These ports are required for tasks such as replica attachment, replica promotion, and
IP address and hostname changes. You can close the RADIUS authentication UDP
ports 1812 and 1813.
C: Port Usage
99
RSA Authentication Manager 8.1 Setup and Configuration Guide
Port Considerations for Trusted Legacy Realms
RSA Authentication Manager 8.1 trusted realms communicate with RSA
Authentication Manager 7.1 or 8.1 trusted realms using the ports listed in Ports for the
RSA Authentication Manager Instance on page 95. To communicate with RSA
Authentication Manager 6.1 trusted realms, you must configure a port range that
Authentication Manager 8.1 uses for authentication. You configure this port range
using the Security Console. The defaults are:
•
Port range = 10 ports
•
Minimum port = 10001
•
Maximum port = 10010
These ports are closed unless an Authentication Manager 6.1 legacy trust relationship
is established. You must configure any firewalls to allow access between the
deployments.
You can change the default settings to improve performance or to coexist with other
network services in the deployment. For example, if many users on Authentication
Manager 8.1 are authenticating on several trusted legacy realms at the same time, RSA
recommends that you increase the port range from the default.
To determine the number of ports to specify, multiply the number of trusted legacy
realms by the number of legacy realm authentications that you expect to occur during
a typical five-second window. For example, if you have 10 trusted legacy realms that
expect two authentications to occur every five seconds, specify a port range of 20.
The Security Console does not verify if a port is already in use, so you must ensure
that a port is available before you make any changes. Do not set the port range less
than 10. A legacy realm requires at least 10 ports for authentication.
For instructions, see the Security Console Help topic “Configure Ports for Trusted
Legacy Realm Authentication.”
100
C: Port Usage
RSA Authentication Manager 8.1 Setup and Configuration Guide
Ports on the Web Tier with a Load Balancer Deployed
The following table lists the default listening ports on the web-tier server when a load
balancer is installed in a deployment.
If your environment has firewalls or proxy servers, make sure that they allow
communication between the web tier and all other hosts and services that provide
Authentication Manager functionality. These hosts and services, which are listed in
the Source column, include Authentication Manager appliances, load balancers, and
browsers.
Port Number
Function
and Protocol
Source
Destination
Description
443, TCP
Self-Service
Console,
risk-based
authentication
(RBA), and
dynamic seed
provisioning
User’s browser Primary
web-tier
hostname
Accepts requests for
Self-Service Console
functions, RBA
authentication, and
dynamic seed
provisioning.
443, TCP
RBA
Load balancer
Accepts requests for
RBA authentication
that use the virtual
hostname.
Web-tier
virtual
hostname
Ports on the Web Tier Without a Load Balancer
The following table lists the default listening ports on the web-tier server when a load
balancer is not used in your deployment.
If your environment has firewalls or proxy servers, make sure that they allow
communication between the web tier and all other hosts and services that provide
Authentication Manager functionality. These hosts and services, which are listed in
the Source column, include Authentication Manager appliances, load balancers, and
browsers.
Port Number
Function
and Protocol
443, TCP
C: Port Usage
Self-Service
Console,
risk-based
authentication
(RBA), and
dynamic seed
provisioning
Source
Destination
User’s browser Primary
web-tier
hostname
Description
Accepts requests for
Self-Service Console
functions, RBA
authentication, and
dynamic seed
provisioning.
101
RSA Authentication Manager 8.1 Setup and Configuration Guide
Port Number
Function
and Protocol
443, TCP
RBA
Source
Destination
User’s browser Web-tier
virtual
hostname
Description
Accepts requests for
RBA authentication.
Important: Keep port 443 (or another port number if you change the default) open on
the replica web tier, so that a listening port is available.
Access Through Firewalls
RSA recommends that you set up all RSA Authentication Manager instances in a
subnet that has an external firewall to segregate it from the rest of the network. To
enable authentication through external firewalls and to accommodate static Network
Address Translation (NAT), you can configure alias IP addresses for Authentication
Manager instances and alternate IP addresses for authentication agents. You can
assign the following:
•
Four distinct IP addresses (the original IP address and up to three aliases) to each
Authentication Manager instance. For instructions, see the Security Console Help
topic “Add Alternative IP Addresses for Instances.”
•
An unlimited number of alternate IP addresses (one primary IP address) to your
agents. For instructions, see the Security Console Help topic “Add an
Authentication Agent.”
Each distinct IP address must be assigned to only one Authentication Manager
instance. Authentication Manager instances must not share an IP address, even if it is
hidden by NAT.
You must know the primary IP address and aliases for each Authentication Manager
instance. If your deployment includes multiple locations, you must also know which
ports are used for Authentication Manager communications and processes. You may
need to open new ports in your firewall, or clear some existing ports for your
deployment. Port translation is supported if the primary and replica instances are
communicating on the standard Authentication Manager ports. For example, the
primary and replica instances must communicate on port 7002, TCP. For more
information on ports, see Port Traffic on page 95.
102
C: Port Usage
RSA Authentication Manager 8.1 Setup and Configuration Guide
Securing Connections Between the Primary and Replica Instances
Authentication Manager uses port 7002 to replicate data between the primary and
replica instance databases. To secure this channel from unauthorized use, RSA
recommends the following:
C: Port Usage
•
If your deployment does not include a replica, or if your primary and replica
instances are on the same LAN, close port 7002 on your external firewall (not the
appliance firewall) so that it does not pass external traffic to the primary or replica
instances.
•
If your primary and replica instances are connected through a WAN and there is a
firewall between them, open port 7002 on the firewall, but restrict traffic on this
port to originate only from the IP addresses of the primary and replica instances.
103
RSA Authentication Manager 8.1 Setup and Configuration Guide
D
Administrative Accounts
System Administrator Accounts
The following accounts provide permission to modify, maintain, and repair the
Authentication Manager deployment. Quick Setup creates these accounts with
information that you enter.
•
Authentication Manager Administrator Accounts
•
Appliance Operating System Account
If you plan to record the logon credentials for these accounts, be sure that the storage
method and location are secure.
Authentication Manager Administrator Accounts
The following table lists the administrator accounts for Authentication Manager. The
administrator who deploys the primary instance creates these accounts during Quick
Setup.
Name
Permissions
Management
Super Admin
Super Admins can perform all
administrative tasks in the Security
Console with full administrative
permission in all security domains
in the deployment.
Any Super Admin can create other
Super Admin users in the Security
Console.
D: Administrative Accounts
An Operations Console
administrator can recover a Super
Admin account if no Super Admin
can access the system.
105
RSA Authentication Manager 8.1 Setup and Configuration Guide
Name
Permissions
Management
Operations
Console
administrator
Operations Console administrators
can perform administrative tasks
in the Operations Console.
Operations Console administrators
also use command line utilities to
perform some procedures, such as
recovering the Super Admin
account. Command line utilities
require the appliance operating
system account password.
Any Super Admin can create and
manage Operations Console
administrators in the Security
Console. For example, you cannot
recover a lost Operations Console
administrator password, but a
Super Admin can create a new
one.
Operations Console administrator
accounts are stored outside of the
Authentication Manager internal
Note: Some tasks in the Operations
database. This ensures that if the
Console also require Super Admin
database becomes unreachable, an
credentials. Only Super Admins
Operations Console administrator
whose records are stored in the
can still access the Operations
internal database are accepted by
Console and command line
the Operations Console.
utilities.
User IDs for a Super Admin and a non-administrative user are validated in the same
way. A valid User ID must be a unique identifier that uses 1 to 255 ASCII characters.
The characters & % > < ` are not allowed.
A valid User ID for an Operations Console administrator must be a unique identifier
that uses 1 to 255 ASCII characters. The characters @ ~ are not allowed, and spaces
are not allowed.
Note: Create an Operations Console administrator account for each Operations
Console user. Do not share account information, especially passwords, among
multiple administrators.
Appliance Operating System Account
The appliance operating system account User ID is rsaadmin. This User ID cannot be
changed. You specify the operating system account password during Quick Setup.
You use this account to access the operating system when you perform advanced
maintenance or troubleshooting tasks. The rsaadmin account is a privileged account to
which access should be strictly limited and audited. Individuals who know the
rsaadmin password and who are logged on as rsaadmin have sudo privileges and shell
access.
Every appliance also has a root user account. This account is not needed for normal
tasks. You cannot use this account to log on to the appliance.
You can access the operating system with Secure Shell (SSH) on a hardware appliance
or a virtual appliance. Before you can access the appliance operating system through
SSH, you must use the Operations Console to enable SSH on the appliance. On a
virtual appliance, you can use the VMware vSphere Client, the Hyper-V System
Center Virtual Machine Manager Console, or the Hyper-V Manager.
106
D: Administrative Accounts
RSA Authentication Manager 8.1 Setup and Configuration Guide
An Operations Console administrator can change the rsaadmin password. For
instructions, see the Operations Console Help topic “Change the Operating System
Account Password.” RSA does not provide a utility to recover the operating system
password.
Manage a Super Admin Account
Only a Super Admin can manage a Super Admin account.
Procedure
1. In the Security Console, click Identity > Users > Manage Existing.
2. Use the search fields to find the user that you want to edit.
3. Click the user that you want to edit and select Edit.
4. Update the user settings.
5. Click Save.
D: Administrative Accounts
107
RSA Authentication Manager 8.1 Setup and Configuration Guide
E
Installing the RSA Authentication Manager
Token Management Snap-In
Overview
The RSA Token Management snap-in provides a convenient way to manage
RSA SecurID tokens for deployments that have an Active Directory identity source.
The RSA Token Management snap-in extends the context menus, property pages,
control bars, and toolbars in the Active Directory Users and Computers snap-in for the
Microsoft Management Console (MMC). You can use the RSA Token Management
snap-in to enable or disable a token, assign a token, or perform other token-related
tasks without logging on to the Security Console. For more information on the
administrative actions enabled by this extension, see the Administrator's Guide.
System Requirements
You can install the RSA Token Management Snap-In on the following platforms:
•
Windows Server 2008 R2 Domain Controller
•
Windows Server 2008 R2 Server with the Active Directory Domain Services
(AD DS) Snap-Ins and Command Line Tools
•
Windows Server 2008 Server with the Active Directory Domain Services
Snap-Ins and Command Line Tools
•
Windows 7 with the with the Active Directory Domain Services Snap-Ins and
Command Line Tools
Install the Token Management Snap-In for Local Access
Use this procedure if you want to administer the Authentication Manager through the
Token Management Snap-In directly on the host where Active Directory is installed.
Before You Begin
You must have the administrative permissions. These permissions (for example,
domain level) depend on your Windows network configuration. At minimum, you
must be a domain administrator and a local machine administrator.
E: Installing the RSA Authentication Manager Token Management Snap-In
109
RSA Authentication Manager 8.1 Setup and Configuration Guide
Procedure
1. Obtain the RSA Token Management Snap-In installation files. The files are in the
RSA Authentication Manager 8.1 – Token Management Snap-In for MMC.zip file
that you can download from RSA SecurCare Online.
2. Unzip all of the installation files into a directory that is located on the same
machine where you are installing the snap-in.
3. Do one of the following:
•
If you have a 32-bit operating system, run setup32.exe.
•
If you have a 64-bit operating system, run setup64.exe.
Note: The installer also installs the Visual C++ redistributable package and
Microsoft.NET framework if they are not already present.
4. Respond to the prompts for Welcome, Select Region, and License Agreement.
5. For Authentication Manager server settings, enter values for the following:
•
Authentication Manager server hostname
•
Authentication Manager server port number
•
Command Server Port
6. When prompted for Destination Location, either accept the default location or
enter an alternative location.
7. Review the Pre-installation screen, and click Next to continue.
8. Click Finish.
Install the Token Management Snap-In for Remote Access
Use this procedure if you want to administer the Authentication Manager through the
Token Management Snap-In remotely from Windows 7 or a Windows Server 2008
without Active Directory.
Active Directory Domain Services (AD DS) Snap-Ins and Command Line Tools are
part of the Remote Server Administration Tools and are used for remotely managing
Active Directory Domain Controllers from Windows Server 2008 R2, Windows
Server 2008 or Windows 7 machines.
For Windows 7, you can perform remote administration using the Remote Server
Administration Tools. This tools package must be downloaded and installed
separately, and can be installed only on Windows 7 (32-bit and 64-bit).
On Windows 2008, the Remote Server Administration Tools feature is part of the
operating system and can be added from the Server Manager.
You can enable the AD DS Snap-Ins and Command Line Tools after installing the
Remote Server Administration Tools.
110
E: Installing the RSA Authentication Manager Token Management Snap-In
RSA Authentication Manager 8.1 Setup and Configuration Guide
Before You Begin
•
For Windows 7, download and install the Remote Server Administration Tools
package from the Microsoft web site.
•
You must have the appropriate permissions. These permissions (for example,
domain level) depend on your Windows network configuration. At minimum, you
must be a domain administrator and a local machine administrator.
•
The administrator using the AD DS Snap-In and Command Line Tools to
remotely administer the Active Directory must have appropriate administrative
permissions. These permissions (for example, domain level) depend on your
Windows network configuration.
Procedure
1. Enable the AD DS Snap-Ins and Command Line Tools feature in Remote
Server Administration Tools.
2. Obtain the RSA Token Management Snap-In installation files. The files are in the
RSA Authentication Manager 8.1 – Token Management Snap-In for MMC.zip file
that you can download from RSA SecurCare Online.
3. Unzip all of the installation files into a directory that is located on the same
machine where you are installing the snap-in.
4. Do one of the following:
•
If you have a 32-bit operating system, run setup32.exe.
•
If you have a 64-bit operating system, run setup64.exe.
5. Respond to the prompts for Welcome, Select Region, and License Agreement.
6. For Authentication Manager server settings, enter values for the following:
•
Authentication Manager server hostname
•
Authentication Manager server port number
•
Authentication Manager Command Server Port
7. When prompted for Destination Location, either accept the default location or
enter an alternative location.
8. Review the Pre-installation screen, and click Next to continue.
9. Click Finish.
E: Installing the RSA Authentication Manager Token Management Snap-In
111
RSA Authentication Manager 8.1 Setup and Configuration Guide
Performing Post-Installation Tasks
After a successful installation, perform the following tasks to complete the MMC
Extension setup.
Procedure
1. Make sure that the Authentication Manager is set up and running.
2. Make sure that Active Directory is configured and registered as an identity source.
For more information see the chapter “Integrating an LDAP Directory” in the
Administrator’s Guide.
3. Start the Active Directory User and Computer Management Console to open the
RSA Token Management Snap-In.
4. Configure the Connection with Authentication Manager
5. Make sure that the Windows user for the Token Management Snap-In is a valid
Active Directory administrator and a valid Authentication Manager administrative
user. For more information on administrator and administrative permissions, see
the chapter “Preparing RSA Authentication Manager for Administration” in the
Administrator’s Guide.
Start the Active Directory User and Computer Management Console
To use the Token Management Snap-In for Authentication Manager administration,
you must start the Active Directory User and Computer Management Console.
Before You Begin
Perform all of the preceding steps in Performing Post-Installation Tasks.
Procedure
Do one of the following:
•
Click Control Panel > Administrative Tools > Active Directory Users and
Computers.
•
From a command prompt, run dsa.msc.
Configure the Connection with Authentication Manager
You must specify connection settings such as server information and authentication
information to enable the Token Management snap-in to access Authentication
Manager Server.
Before You Begin
Perform all of the preceding steps in Performing Post-Installation Tasks
Procedure
1. Access the Active Directory Users and Computers Management Console.
2. Click on any user. This makes the RSA button visible in the toolbar.
112
E: Installing the RSA Authentication Manager Token Management Snap-In
RSA Authentication Manager 8.1 Setup and Configuration Guide
3. Click RSA in the toolbar.
The RSA Token Management Setting page is displayed.
4. In the Server Information section, do the following:
a. In the AM Server Host field, enter the name of the machine on which RSA
Authentication Manager is running.
b. In the AM Server port field, enter the port number on which RSA
Authentication Manager is running.
c. In the Command Server Port field, enter the port number on which the
Command Server is running on the Authentication Manager Server.
5. In the Authentication Information section, do the following:
a. Select the UserID type for the user.
The format of the username displayed in the Login User field will be based
on the chosen UserID type.
Important: The UserID type must be the same as that defined for this identity
source in the Authentication Manager.
This user must be a member of the Domain Administrators group in Active
Directory and must be assigned Super Admin privileges in Authentication
Manager.
b. In the User Password field, enter the user’s password.
c. Click Test Authentication to perform a test authentication.
If the UserID exists in more than one identity source, you can choose the
identity source to test. The chosen identity source will be displayed in the
Identity Source Name field. When prompted to use the certificate for future
communication, click yes.
E: Installing the RSA Authentication Manager Token Management Snap-In
113
RSA Authentication Manager 8.1 Setup and Configuration Guide
Glossary
Active Directory
The directory service that is included with Microsoft Windows Server 2003 SP2,
Microsoft Windows Server 2008, and Microsoft Windows Server 2008 R2.
Active Directory forest
A federation of identity servers for Windows Server environments. All identity servers
share a common schema, configuration, and Global Catalog.
administrative role
A collection of permissions and the scope within which those permissions apply.
administrator
Any user with one or more administrative roles that grant administrative permission to
manage the system.
agent host
The machine on which an agent is installed.
appliance
The hardware or guest virtual machine running RSA Authentication Manager. The
appliance can be set up as a primary instance or a replica instance.
approver
A Request Approver or an administrator with approver permissions.
assurance level
For risk-based authentication, the system categorizes each authentication attempt into
an assurance level that is based on the user’s profile, device, and authentication
history. If the authentication attempt meets the minimum assurance level that is
required by the RBA policy, the user gains access to the RBA-protected resource.
Otherwise, the user must provide identity confirmation to access the RBA-protected
resource.
attribute
A characteristic that defines the state, appearance, value, or setting of something. In
Authentication Manager, attributes are values associated with users and user groups.
For example, each user group has three standard attributes called Name, Identity
Source, and Security Domain.
attribute mapping
The process of relating a user or user group attribute, such as User ID or Last Name, to
one or more identity sources linked to the system. No attribute mapping is required in
a deployment where the internal database is the primary identity source.
audit information
Data found in the audit log representing a history of system events or activity
including changes to policy or configuration, authentications, authorizations, and so
on.
Glossary
115
RSA Authentication Manager 8.1 Setup and Configuration Guide
audit log
A system-generated file that is a record of system events or activity. The system
includes four such files, called the Trace, Administrative, Runtime Audit, and System
logs.
authentication
The process of reliably determining the identity of a user or process.
authentication agent
A software application installed on a device, such as a domain server, web server, or
desktop computer, that enables authentication communication with Authentication
Manager on the network server. See agent host.
authentication method
The type of procedure required for obtaining authentication, such as a one-step
procedure, a multiple-option procedure (user name and password), or a chained
procedure.
authentication protocol
The convention used to transfer the credentials of a user during authentication, for
example, HTTP-BASIC/DIGEST, NTLM, Kerberos, and SPNEGO.
authentication server
A component made up of services that handle authentication requests, database
operations, and connections to the Security Console.
authenticator
A device used to verify a user's identity to Authentication Manager. This can be a
hardware token (for example, a key fob) or a software token.
authorization
The process of determining if a user is allowed to perform an operation on a resource.
backup
A file that contains a copy of your primary instance data. You can use the backup file
to restore the primary instance in a disaster recovery situation. An RSA
Authentication Manager backup file includes: the internal database, appliance-only
data and configuration, keys and passwords used to access internal services, and
internal database log files. It does not include all the appliance and operating system
log files.
certificate
An asymmetric public key that corresponds with a private key. It is either self-signed
or signed with the private key of another certificate.
certificate DN
The distinguished name of the certificate issued to the user for authentication.
command line utility (CLU)
A utility that provides a command line user interface.
116
Glossary
RSA Authentication Manager 8.1 Setup and Configuration Guide
core attributes
The fixed set of attributes commonly used by all RSA products to create a user. These
attributes are always part of the primary user record, whether the deployment is in an
LDAP or RDBMS environment. You cannot exclude core attributes from a view, but
they are available for delegation.
Cryptographic Token-Key Initialization Protocol (CT-KIP)
A client-server protocol for the secure initialization and configuration of software
tokens. The protocol requires neither private-key capabilities in the tokens, nor an
established public-key infrastructure. Successful execution of the protocol results in
the generation of the same shared secret on both the server as well as the token.
custom attributes
An attribute you create in Authentication Manager and map to a field in an LDAP
directory. For example, you could create a custom attribute for a user’s department.
data store
A data source, such as a relational database (Oracle or DB2) or directory server
(Microsoft Active Directory or Oracle Directory Server). Each type of data source
manages and accesses data differently.
delegated administration
A scheme for defining the scope and responsibilities of a set of administrators. It
permits administrators to delegate a portion of their responsibilities to another
administrator.
delivery address
The e-mail address or the mobile phone number where the on-demand tokencodes will
be delivered.
deployment
An installation of Authentication Manager that consists of a primary instance and,
optionally, one or more replica instances.
demilitarized zone
The area of a network configured between two network firewalls.
device history
For risk-based authentication, the system maintains a device history for each user. It
includes the devices that were used to gain access to protected resources.
device registration
For risk-based authentication, the process of saving an authentication device to the
user’s device history.
distribution file password
A password used to protect the distribution file when the distribution file is sent by
e-mail to the user.
distributor
A Token Distributor or an administrator with distributor permissions.
DMZ
See demilitarized zone.
Glossary
117
RSA Authentication Manager 8.1 Setup and Configuration Guide
dynamic seed provisioning
The automation of all the steps required to provide a token file to a device that hosts a
software token, such as a web browser, using the Cryptographic Token-Key
Initialization Protocol (CT-KIP).
e-mail notifications
Contain status information about requests for user enrollment, tokens, and user group
membership that is sent to users who initiated the request. For token requests, e-mail
notifications also contain information about how to download and activate tokens.
Request Approvers and Token Distributors receive e-mail notifications about requests
that require their action. See e-mail templates.
e-mail templates
Templates that administrators can use to customize e-mail notifications about user
requests for user enrollment, tokens, user group membership, or the on-demand
tokencode service. See e-mail notifications.
excluded words dictionary
A dictionary containing a record of words that users cannot use as passwords. It
prevents users from using common, easily guessed words as passwords.
fixed passcode
Similar to a password that users can enter to gain access in place of a PIN and
tokencode. The format for fixed passcodes is defined in the token policy assigned to a
security domain. An administrator creates a fixed passcode in a users authentication
settings page. Fixed passcodes can be alphanumeric and contain special characters,
depending on the token policy.
Global Catalog
A read-only, replicated repository of a subset of the attributes of all entries in an
Active Directory forest.
Global Catalog identity source
An identity source that is associated with an Active Directory Global Catalog. This
identity source is used for finding and authenticating users, and resolving group
membership within the forest.
identity attribute
Customer-defined attributes that are mapped to an existing customer-defined schema
element. They are always stored in the same physical repository as the user’s or user
group’s core attribute data. You can search, query, and report on these attributes. Each
identity attribute definition must map to an existing attribute in an LDAP directory or
RDBMS.
identity confirmation method
For risk-based authentication, an authentication method that can be used to confirm a
user’s identity.
identity source
A data store containing user and user group data. The data store can be the internal
database or an external directory server, such as Microsoft Active Directory.
118
Glossary
RSA Authentication Manager 8.1 Setup and Configuration Guide
instance
An installation of RSA Authentication Manager that can be set up as a primary
instance or a replica instance. An instance also includes a RADIUS server.
internal database
The Authentication Manager proprietary data source.
keystore
The facility for storing keys and certificates.
load balancer
A deployment component used to distribute authentication requests across multiple
computers to achieve optimal resource utilization. The load balancer is usually
dedicated hardware or software that can provide redundancy, increase reliability, and
minimize response time. See Round Robin DNS.
lower-level security domain
In a security domain hierarchy, a security domain that is nested within another security
domain.
minimum assurance level
See assurance level.
node secret
A long-lived symmetric key that the agent uses to encrypt the data in the
authentication request. The node secret is known only to Authentication Manager and
the agent.
on-demand tokencode
Tokencodes delivered by SMS or SMTP. These tokencodes require the user to enter a
PIN to achieve two-factor authentication. On-demand tokencodes are user-initiated, as
Authentication Manager only sends a tokencode to the user when it receives a user
request. An on-demand tokencode can be used only once. The administrator
configures the lifetime of an on-demand tokencode. See on-demand tokencode
service.
on-demand tokencode service
A service that allows enabled users to receive tokencodes by text message or e-mail,
instead of by tokens. You configure the on-demand tokencode service and enable
users on the Security Console.
Operations Console
An administrative user interface through which the user configures and sets up
Authentication Manager, for example, adding and managing identity sources, adding
and managing instances, and disaster recovery.
permissions
Specifies which tasks an administrator is allowed to perform.
preferred instance
The Authentication Manager instance that the risk-based authentication service in the
web tier communicates with first. Also, the instance that provides updates to the web
tier. Any instance can be the preferred instance. For example, you can configure a
replica instance as the preferred instance.
Glossary
119
RSA Authentication Manager 8.1 Setup and Configuration Guide
primary instance
The installed deployment where authentication and all administrative actions are
performed.
promotion, for disaster recovery
The process of configuring a replica instance to become the new primary instance.
During promotion, the original primary instance is detached from the deployment. All
configuration data referring to the original primary instance is removed from the new
primary instance.
promotion, for maintenance
The process of configuring a replica instance to become the new primary instance
when all instances are healthy. During promotion, a replica instance is configured as a
primary instance. The original primary instance is demoted and configured as a replica
instance.
provisioning
See token provisioning.
provisioning data
The provisioning server-defined data. This is a container of information necessary to
complete the provisioning of a token device.
RADIUS
See Remote Authentication Dial-In User Service.
RBA
See risk-based authentication.
RBA integration script
A script that redirects the user from the default logon page of a web-based application
to a customized logon page. This allows Authentication Manager to authenticate the
user with risk-based authentication. To generate an integration script, you must have
an integration script template.
realm
A realm is an organizational unit that includes all of the objects managed within a
single deployment, such as users and user groups, tokens, password policies, and
agents. Each deployment has only one realm.
Remote Authentication Dial-In User Service (RADIUS)
A protocol for administering and securing remote access to a network. A RADIUS
server receives remote user access requests from RADIUS clients, for example, a
VPN.
replica instance
The installed deployment where authentication occurs and at which an administrator
can view the administrative data. No administrative actions are performed on the
replica instance.
replica package
A file that contains configuration data that enables the replica appliance to connect to
the primary appliance. You must generate a replica package before you set up a replica
appliance.
120
Glossary
RSA Authentication Manager 8.1 Setup and Configuration Guide
requests
Allows users to enroll, as well as request tokens, the on-demand tokencode service,
and user group membership.
Request Approver
A predefined administrative role that grants permission to approve requests from users
for user enrollment, tokens, or user group membership.
risk-based authentication (RBA)
An authentication method that analyzes the user’s profile, authentication history, and
authentication device before granting access to a protected resource.
risk engine
In Authentication Manager, the risk engine intelligently assesses the authentication
risk for each user. It accumulates knowledge about each user’s device and behavior
over time. When the user attempts to authenticate, the risk engine refers to its
collected data to evaluate the risk. The risk engine then assigns an assurance level,
such as high, medium, or low, to the user’s authentication attempt.
round robin DNS
An alternate method of load balancing that does not require dedicated software or
hardware. When the Domain Name System (DNS) server is configured and enabled
for round robin, the DNS server sends risk-based authentication (RBA) requests to the
web-tier servers. See Load Balancer.
scope
In a deployment, the security domain or domains within which a role’s permissions
apply.
Secure Sockets Layer (SSL)
A protocol that uses cryptography to enable secure communication over the Internet.
SSL is widely supported by leading web browsers and web servers.
Security Console
An administrative user interface through which the user performs most of the
day-to-day administrative activities.
security domain
A container that defines an area of administrative management responsibility,
typically in terms of business units, departments, partners, and so on. Security
domains establish ownership and namespaces for objects (users, roles, permissions,
and so on) within the system. They are hierarchical.
security questions
A way of allowing users to authenticate without using their standard method. To use
this service, a user must answer a number of security questions. To authenticate using
this service, the user must correctly answer all or a subset of the original questions.
self-service
A component of Authentication Manager that allows the user to update user profiles,
change passwords for the Self-Service Console, configure life questions, clear devices
enabled for risk-based authentication, change e-mail addresses or phone numbers for
on-demand authentication, and manage on-demand authentication PINs. The user can
also request, maintain, and troubleshoot tokens.
Glossary
121
RSA Authentication Manager 8.1 Setup and Configuration Guide
Self-Service Console
A user interface through which the user can update user profiles, change passwords
for the Self-Service Console, configure life questions, clear devices enabled for
risk-based authentication, change e-mail addresses or phone numbers for on-demand
authentication, and manage on-demand authentication PINs. Users can also request,
maintain, and troubleshoot tokens on the Self-Service Console.
session
An encounter between a user and a software application that contains data pertaining
to the user’s interaction with the application. A session begins when the user logs on
to the software application and ends when the user logs off of the software application.
shipping address
An address used by distributors to distribute hardware tokens.
silent collection
For risk-based authentication, a period during which the system silently collects data
about each user’s profile, authentication history, and authentication devices without
requiring identity confirmation during logon.
SSL
See Secure Sockets Layer.
Super Admin
An administrator with permissions to perform all administrative tasks in the Security
Console. A Super Admin:
•
Can link identity sources to system
•
Has full permissions within a deployment
•
Can assign administrative roles within a deployment
system event
System-generated information related to nonfunctional system events, such as server
startup and shutdown, failover events, and replication events.
System log
A persistable store for recording system events.
time-out
The amount of time (in seconds) that the user’s desktop can be inactive before
reauthentication is required.
token distributor
A predefined administrative role that grants permission to act upon requests from
users for tokens. Distributors record how they plan to deliver tokens to users and close
requests.
token provisioning
The automation of all the steps required to provide enrollment, user group
membership, RSA SecurID tokens, and the on-demand tokencode service to users.
See also self-service.
122
Glossary
RSA Authentication Manager 8.1 Setup and Configuration Guide
top-level security domain
The top-level security domain is the first security domain in the security domain
hierarchy. The top-level security domain is unique in that it links to the identity source
or sources and manages the password, locking, and authentication policy for the entire
deployment.
Trace log
A persistable store for trace information.
trusted realm
A trusted realm is a realm that has a trust relationship with another realm. Users on a
trusted realm have permission to authenticate to another realm and access the
resources on that realm. Two or more realms can have a trust relationship. A trust
relationship can be either one-way or two-way.
trust package
An XML file that contains configuration information about the deployment.
UDP
See User Datagram Protocol.
User Datagram Protocol (UDP)
A protocol that allows programs on networked computers to communicate with one
another by sending short messages called datagrams.
User ID
A character string that the system uses to identify a user attempting to authenticate.
Typically a User ID is the user’s first initial followed by the last name. For example,
Jane Doe’s User ID might be jdoe.
virtual host
Physical computer on which a virtual machine is installed. A virtual host helps
manage traffic between web-based applications, web-tier deployments, and the
associated primary instance and replica instances.
virtual hostname
The publicly-accessible hostname. End users use this virtual hostname to authenticate
through the web tier. The system also generates SSL information based on the virtual
hostname. The virtual hostname must be same as the load balancer hostname.
web tier
A web tier is a platform for installing and deploying the Self-Service Console,
Dynamic Seed Provisioning, and the risk-based authentication (RBA) service in the
DMZ. The web tier prevents end users from accessing your private network by
receiving and managing inbound internet traffic before it enters your private network.
workflow
The movement of information or tasks through a work or business process. A
workflow can consist of one or two approval steps and a distribution step for different
requests from users.
workflow participant
Either approvers or distributors. Approvers review, approve, or defer user requests.
Distributors determine the distribution method for token requests and record the
method for each request. See also workflow.
Glossary
123
RSA Authentication Manager 8.1 Setup and Configuration Guide
Index
A
D
Active Directory, 73
RSA Token Management Snap-In, 109,
112
add users, 73
administrative consoles
logging on, 45
administrators
system administrator accounts, 105
aliases
number allowed, 102
alternate IP address, 102
appliance license file, 25
attach a replica instance, 51
solving an issues, 52
attributes
data location, 20
authentication agents
alternate IP addresses, 102
embedded, 21
overview, 13
supported, 21
authentication failure
system time changed, 22
authentication methods
configuration, 74
data stores
supported, 20
deployment
next steps, 73
options, 13
security, 75
using a subnet, 95
using firewalls, 102
deployment package
web-tiers, 93
dynamic seed provisioning
in the web tier, 60
B
browsers
security, 21
support, 21
C
certificates
managing for SSL, 44
SSL-LDAP, 20
characters
supported in path and filenames, 66, 67,
68, 70
checklists
deployment, 24, 26
deployment configuration, 28
web tier installation, 65
consoles
logging on, 45
F
filenames
supported characters, 66, 67, 68, 70
Firefox, 21
firewalls
aliases, 102
Network Address Translation, 102
H
hardware appliance
deploying, 40
HTTPS redirection
load balancer, 55
Hyper-V
feature support, 18, 19
Hyper-V virtual appliance zip file, 35, 38
I
identity sources, 20
installation
firewall access, 102
internal database, 20
compared to external database, 20
Internet Explorer, 21
IP addresses
aliases, 102
J
JavaScript, 21
L
LDAP directory servers, 20
Index
125
RSA Authentication Manager 8.1 Setup and Configuration Guide
license
file, 25
ID, 11
serial number, 11
licensing requirements, 22
load balancer
health checks, 57
overview, 13
requirements, 55
using with RSA Authentication
Manager, 55
local access
RSA Token Management Snap-In, 109
M
member user group
LDAP directory server integration, 20
MMC Extension. See Token Management
Snap-In
N
NAT. See Network Address Translation
Network Address Translation, 102
agent IP address alias, 102
Network Time Protocol server, 22
next steps, 73
NTP server. See Network Time Protocol
server.
O
open files hard limit, 62
Open Virtual Appliance (OVA) file, 24, 26,
31, 33
operating system
account, 106
password, 26, 28
operating systems, 62
Operations Console
administrator permissions, 106
supported web browsers, 21
URL, 45
OVA file. See Open Virtual Appliance file.
P
passwords
lost, 106–107
paths
supported characters, 66, 67, 68, 70
126
port translation, 102
port usage
list of ports, 95
on a web tier, 101
traffic flow diagram, 95
ports, 62
post-installation steps, 73
primary instance
attach a replica instance, 51
deployment checklist, 24
deployment tasks, 31
hardware requirements, 16, 19
overview, 13
Quick Setup, 42
secure connection to a replica
instance, 103
Q
Quick Setup
primary instance, 42
replica instance, 48
R
remote access
RSA Token Management Snap-In, 110
replica instances
attachment, 51
deployment checklist, 26
hardware requirements, 16, 19
Network Time Protocol server
required, 22
overview, 13
Quick Setup, 48
secure connection to a primary
instance, 103
solving an attachment issue, 52
replica package
generating, 48
requests
through the primary instance, 13
risk-based authentication
preferred instance, 60
traffic in the web tier, 60
Round Robin DNS
configuration, 57
ports, 101
RSA Security Console
URL, 45
Index
RSA Authentication Manager 8.1 Setup and Configuration Guide
S
V
Secure Shell
for accessing the appliance, 106
port, 96
Secure Sockets Layer
managing SSL certificates, 44
security, 75
Security Console
supported web browsers, 21
URL, 45
self-service, 75
Self-Service Console
in the web tier, 60
URL, 45
SSH. See Secure Shell.
SSL See Secure Sockets Layer
store user accounts, 73
subnet
deploying appliance, 95
Super Admin, 107
managing, 107
permissions, 105
supported web browsers, 21
system administrator accounts, 105
valid characters
for User IDs, 106
version
viewing, 11
virtual appliance
deploying with VMware vCenter, 31
deploying without VMware vCenter, 33
virtual hosts
configure for web tier, 55
VMware
feature support, 15, 16
T
Token Management Snap-In
connection to Authentication
Manager, 112
installing for local access, 109
installing for remote access, 110
system requirements, 109
U
update web tier, 83, 94
URL
Operations Console, 45
RSA Security Console, 45
RSA Self-Service Console, 45
Security Console, 45
User IDs
valid characters, 106
user persistence
load balancer, 55
W
web browsers
security, 21
support, 21
web tiers
benefits, 59
configure virtual host, 55
date and time synchronization, 62
definition, 59
deployment package, 93
diagram, 60
installation checklist, 65
installing, 63
Linux command line installation, 70
Linux GUI installation, 68
load balancer ports, 101
number allowed, 63
overview, 13
ports, 61
pre-installation tasks, 62
Round Robin DNS ports, 101
Self-Service Console URL, 63
supported operating systems, 62
system requirements, 61
updating, 83, 94
VMWare support, 62
Windows command line installation, 67
Windows GUI installation, 66
Windows installer location, 66, 67
web-based administrative consoles
logging on, 45
X
x-forwarded-for headers
load balancer, 55
Index
127